Skip to main content

Voice Trust in Public Switched Telephone Networks

  • Conference paper
Multimedia Communications, Services and Security (MCSS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 287))

Abstract

This paper discusses the results of research work performed to change the speaker’s voice profile and edit the voice message in an unauthorized way. The results of conducted research work confirm that the intentional voice modeling in telephone lines can result in gaining or losing trust in the subscriber, thus gaining or losing access to confidential messages in an unauthorized way. The analysis of security regarding the trust in voice identity leads to developing new, unconventional protection methods: using hidden identification in the form of watermarking tokens and the tests of susceptibility to impersonation of the key corporation personnel and government officials.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://gorzow.gazeta.pl/gorzow/Na_wnuczka

  2. http://www.merriam-webster.com/dictionary/trust

  3. http://legal-dictionary.thefreedictionary.com/trust

  4. http://www.yourdictionary.com/trust

  5. Piotrowski, Z., Gajewski, P.: Identity management In VHF radio systems, Computational Methods and Experimental Measurements XV. In: CMEM XV, pp. 473–481. WIT Press, Southampton (2011) ISBN: 978-1-84564-540-3, ISSN: 1746-4064, ISSN: 1743-355X

    Chapter  Google Scholar 

  6. Piotrowski, Z.: Drift Correction Modulation scheme for digital signal processing. Mathematical and Computer Modelling, September 16 (2011), doi: 10.1016/j.mcm

    Google Scholar 

  7. http://www.ascom.com/en/index/

  8. http://www.jkaudio.com

  9. http://www.audio4fun.com/

  10. Abe, M.: Speech morphing by gradually changing spectrum parameter and fundamental frequency. In: Proceedings of International Conference on Spoken Language Processing, ICSLP, vol. 4, pp. 2235–2238. NTT Human Interface Laboratories, Japan (1996)

    Chapter  Google Scholar 

  11. http://www.scribd.com/doc/17605831/Voice-Morphing

  12. Yanagisawa, K., Huckvale, M.: Accent morphing as a technique to improve the intelligibility of foreign-accented speech. ICPhS XVII ID1486 Sarbriicken, August 6-10 (2007)

    Google Scholar 

  13. Furuya, K., Moriyama, T., Ozawa, S.: Generation of speaker mixture voice using spectrum morphing. IEEE (2007)

    Google Scholar 

  14. Slaney, M., Covell, M., Lassiter, B.: Automatic Audio Morphing. In: International Conference on Acoustics, Speech and Signal Processing, Atlanta, GA, May 7-10 (1996)

    Google Scholar 

  15. Mousa, A.: Voice conversion using pitch shifting algorithm by time stretching with PSOLA and re-sampling. Journal of Electrical Engineering 61(1), 57–61 (2010)

    Article  MathSciNet  Google Scholar 

  16. http://www.mm.pl/~rados/tresc/gener.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Piotrowski, Z., Grabiec, W. (2012). Voice Trust in Public Switched Telephone Networks. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2012. Communications in Computer and Information Science, vol 287. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30721-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30721-8_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30720-1

  • Online ISBN: 978-3-642-30721-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics