Voice Trust in Public Switched Telephone Networks
This paper discusses the results of research work performed to change the speaker’s voice profile and edit the voice message in an unauthorized way. The results of conducted research work confirm that the intentional voice modeling in telephone lines can result in gaining or losing trust in the subscriber, thus gaining or losing access to confidential messages in an unauthorized way. The analysis of security regarding the trust in voice identity leads to developing new, unconventional protection methods: using hidden identification in the form of watermarking tokens and the tests of susceptibility to impersonation of the key corporation personnel and government officials.
Keywordsvoice trust impersonation voice morphing voice profile voice message watermarking token hidden identification data hiding
Unable to display preview. Download preview PDF.
- 6.Piotrowski, Z.: Drift Correction Modulation scheme for digital signal processing. Mathematical and Computer Modelling, September 16 (2011), doi: 10.1016/j.mcmGoogle Scholar
- 12.Yanagisawa, K., Huckvale, M.: Accent morphing as a technique to improve the intelligibility of foreign-accented speech. ICPhS XVII ID1486 Sarbriicken, August 6-10 (2007)Google Scholar
- 13.Furuya, K., Moriyama, T., Ozawa, S.: Generation of speaker mixture voice using spectrum morphing. IEEE (2007)Google Scholar
- 14.Slaney, M., Covell, M., Lassiter, B.: Automatic Audio Morphing. In: International Conference on Acoustics, Speech and Signal Processing, Atlanta, GA, May 7-10 (1996)Google Scholar