Introducing a Novel Data Over Voice Technique for Secure Voice Communication

The increasing need for privacy-preserving voice communications is encouraging the investigation of new secure voice transmission techniques. This paper refers to the original concept of sending encrypted data or speech as pseudo-speech in the audio domain over existing voice communication infrastru...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2022-06, Vol.124 (4), p.3077-3103
Hauptverfasser: Krasnowski, Piotr, Lebrun, Jerome, Martin, Bruno
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The increasing need for privacy-preserving voice communications is encouraging the investigation of new secure voice transmission techniques. This paper refers to the original concept of sending encrypted data or speech as pseudo-speech in the audio domain over existing voice communication infrastructures, like 3G cellular network and Voice over IP (VoIP). The distinctive characteristic of such a communication system is that it relies on the robust transmission of binary information in the form of audio signal. This work presents a novel Data over Voice (DoV) technique based on codebooks of short harmonic waveforms. The technique provides a sufficiently fast and reliable data rate over cellular networks and many VoIP applications. The new method relies on general principles of Linear Predictive Coding for voice compression (LPC voice coding) and is more versatile compared to solutions trained on exact channel models. The technique gives by design a high control over the desired rate of transmission and provides robustness to channel distortion. In addition, an efficient codebook design approach inspired by quaternary error correcting codes is proposed. The usability of the proposed DoV technique for secure voice communication over cellular networks and VoIP has been successfully validated by empirical experiments. The paper details the system parameters, putting a special emphasis on system’s security and technical challenges.
ISSN:0929-6212
1572-834X
DOI:10.1007/s11277-022-09503-6