METHOD OF ENSURING THE CONFIDENTIALITY OF SPEECH NEGOTIATIONS TAKING INTO ACCOUNT PSYCHOACOUSTIC MASKING

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.1095

Keywords:

noise masking;, speech confidentiality;, psychoacoustic masking;, noise optimization;, adaptive masking;, information protection;, cybersecurity;, parametric noise model.

Abstract

The article considers the problem of ensuring the confidentiality of speech signals in communication systems under conditions of limited resources, strict requirements for delay and incompatibility with the existing infrastructure, where traditional cryptographic methods often prove unsuitable. A new approach to noise masking is proposed, aimed not at minimizing theoretical mutual information, but at maximizing the degree of psychoacoustic masking — that is, at effectively hiding the useful signal by using the properties of human auditory perception. An optimization model for the synthesis of an adaptive noise additive is formalized, which simultaneously satisfies technical constraints (frequency band 100–4000 Hz, power limitation), functional requirements (reproduction quality for a legal user, MSE < 0.01) and provides the possibility of synchronization. A bell-shaped spectrum is used as a parametric noise model, which allows reducing a high-dimensional problem to the optimization of several key parameters. Using the example of a numerical experiment with a speech signal of 1 s duration, it is shown that the proposed method significantly increases the degree of masking — up to 87% of the useful signal energy becomes unacceptable for perception by an unauthorized listener — while maintaining high quality signal recovery. The results confirm the promising approach for building practically implemented protection systems that combine security, efficiency and compatibility with existing communication standards.

Downloads

Download data is not yet available.

References

Kryvulia, H. O., & Stepanenko, V. V. (2020). Application of psychoacoustic models for speech information protection in communication systems. Bulletin of the National Technical University “KhPI”. Series: Informatics and Modeling, (2), 45–51. http://repository.kpi.kharkov.ua/handle/20.500.12494/29876

Lutsenko, O. I., & Boiko, A. S. (2021). Adaptive noise masking of speech signals considering human auditory perception. Proceedings of Kharkiv National Air Force University, (3), 112–117. https://hups.mil.gov.ua/journal/2021_3/2021_3_23.pdf

Horbenko, Y. I., & Kachko, O. V. (2019). Modern methods of speech information protection under resource constraints. Scientific Bulletin of Uzhhorod University. Series: Computer Science, 1(45), 34–40. https://visnyk.uzhnu.edu.ua/index.php/visnyk/article/view/2456

Johnston, J. D. (1989). Transform coding of audio signals using perceptual noise criteria. IEEE Journal on Selected Areas in Communications, 6(2), 314–323. https://doi.org/10.1109/49.190305

Painter, T., & Spanias, A. (2000). Perceptual coding of digital audio. Proceedings of the IEEE, 88(4), 451–513. https://doi.org/10.1109/5.843005

Wang, D., & Brown, G. J. (2008). Computational auditory scene analysis: Principles, algorithms, and applications. Wiley-IEEE Press. https://doi.org/10.1002/9780470149334

Zhang, X., et al. (2021). Adversarial audio perturbations for privacy protection in voice communication. IEEE Transactions on Information Forensics and Security, 16, 3876–3889. https://doi.org/10.1109/TIFS.2021.3095350

Lukova-Chuiko, N. V., Toliupa, S. V., Pohasii, S. S., Laptieva, T. O., & Laptiev, S. O. (2021). Improvement of information protection model in social networks. Proceedings of the Military Institute of Taras Shevchenko National University of Kyiv, (73), 88–103.

Kalchuka, I., Laptiev, S., & Laptieva, T. (2021). Analysis of data transmission using a modified neural network. International Journal of Artificial Intelligence and Informatics, 3(2), 73–79. https://doi.org/10.33292/ijarlit.v3i2.49

Sobchuk, V., Laptiev, S., Laptieva, T., Barabash, O., Drobyk, O., & Sobchuk, A. (2024). A modified method of spectral analysis of radio signals using the operator approach for the Fourier transform. IT, Automation, Measurements in Economy and Environmental Protection, 14(2), 56–61. https://doi.org/10.35784/iapgos.5783

Downloads


Abstract views: 0

Published

2026-03-26

How to Cite

Laptiev, O., Pogasiy , S., Parkhomenko, I., Laptieva, T., & Laptiev, S. (2026). METHOD OF ENSURING THE CONFIDENTIALITY OF SPEECH NEGOTIATIONS TAKING INTO ACCOUNT PSYCHOACOUSTIC MASKING. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 565–572. https://doi.org/10.28925/2663-4023.2026.32.1095

Most read articles by the same author(s)

1 2 > >>