METHOD OF ENSURING THE CONFIDENTIALITY OF SPEECH NEGOTIATIONS TAKING INTO ACCOUNT PSYCHOACOUSTIC MASKING
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1095Keywords:
noise masking;, speech confidentiality;, psychoacoustic masking;, noise optimization;, adaptive masking;, information protection;, cybersecurity;, parametric noise model.Abstract
The article considers the problem of ensuring the confidentiality of speech signals in communication systems under conditions of limited resources, strict requirements for delay and incompatibility with the existing infrastructure, where traditional cryptographic methods often prove unsuitable. A new approach to noise masking is proposed, aimed not at minimizing theoretical mutual information, but at maximizing the degree of psychoacoustic masking — that is, at effectively hiding the useful signal by using the properties of human auditory perception. An optimization model for the synthesis of an adaptive noise additive is formalized, which simultaneously satisfies technical constraints (frequency band 100–4000 Hz, power limitation), functional requirements (reproduction quality for a legal user, MSE < 0.01) and provides the possibility of synchronization. A bell-shaped spectrum is used as a parametric noise model, which allows reducing a high-dimensional problem to the optimization of several key parameters. Using the example of a numerical experiment with a speech signal of 1 s duration, it is shown that the proposed method significantly increases the degree of masking — up to 87% of the useful signal energy becomes unacceptable for perception by an unauthorized listener — while maintaining high quality signal recovery. The results confirm the promising approach for building practically implemented protection systems that combine security, efficiency and compatibility with existing communication standards.
Downloads
References
Kryvulia, H. O., & Stepanenko, V. V. (2020). Application of psychoacoustic models for speech information protection in communication systems. Bulletin of the National Technical University “KhPI”. Series: Informatics and Modeling, (2), 45–51. http://repository.kpi.kharkov.ua/handle/20.500.12494/29876
Lutsenko, O. I., & Boiko, A. S. (2021). Adaptive noise masking of speech signals considering human auditory perception. Proceedings of Kharkiv National Air Force University, (3), 112–117. https://hups.mil.gov.ua/journal/2021_3/2021_3_23.pdf
Horbenko, Y. I., & Kachko, O. V. (2019). Modern methods of speech information protection under resource constraints. Scientific Bulletin of Uzhhorod University. Series: Computer Science, 1(45), 34–40. https://visnyk.uzhnu.edu.ua/index.php/visnyk/article/view/2456
Johnston, J. D. (1989). Transform coding of audio signals using perceptual noise criteria. IEEE Journal on Selected Areas in Communications, 6(2), 314–323. https://doi.org/10.1109/49.190305
Painter, T., & Spanias, A. (2000). Perceptual coding of digital audio. Proceedings of the IEEE, 88(4), 451–513. https://doi.org/10.1109/5.843005
Wang, D., & Brown, G. J. (2008). Computational auditory scene analysis: Principles, algorithms, and applications. Wiley-IEEE Press. https://doi.org/10.1002/9780470149334
Zhang, X., et al. (2021). Adversarial audio perturbations for privacy protection in voice communication. IEEE Transactions on Information Forensics and Security, 16, 3876–3889. https://doi.org/10.1109/TIFS.2021.3095350
Lukova-Chuiko, N. V., Toliupa, S. V., Pohasii, S. S., Laptieva, T. O., & Laptiev, S. O. (2021). Improvement of information protection model in social networks. Proceedings of the Military Institute of Taras Shevchenko National University of Kyiv, (73), 88–103.
Kalchuka, I., Laptiev, S., & Laptieva, T. (2021). Analysis of data transmission using a modified neural network. International Journal of Artificial Intelligence and Informatics, 3(2), 73–79. https://doi.org/10.33292/ijarlit.v3i2.49
Sobchuk, V., Laptiev, S., Laptieva, T., Barabash, O., Drobyk, O., & Sobchuk, A. (2024). A modified method of spectral analysis of radio signals using the operator approach for the Fourier transform. IT, Automation, Measurements in Economy and Environmental Protection, 14(2), 56–61. https://doi.org/10.35784/iapgos.5783
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Олександр Лаптєв, Сергій Погасій, Іван Пархоменко, Тетяна Лаптєв, Сергій Лаптєв

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.