NUST Institutional Repository

Analysing encrypted speech

Show simple item record

dc.contributor.author Khan, Liaqat Ali
dc.contributor.author Supervised by Dr. Muhammad Shamim Baig
dc.date.accessioned 2020-11-11T06:21:42Z
dc.date.available 2020-11-11T06:21:42Z
dc.date.issued 2010-08-08
dc.identifier.other PhD IS-04
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/11342
dc.description.abstract Speech is digitized, encrypted and sent between two parties in many situations. Digitized speech signals are generally considered as ordinary binary data streams as far as encryption is concerned. In this thesis, we present that the properties of speech signals are different from text, image, video and other non speech signals and need special attention while being encrypted. These properties of speech signals have to be kept in mind, not only, while designing encryption algorithms for digitized speech signals but also during implementation of these algorithms in software and hardware. We present that how the statistical properties of speech can be utilized to extract important information, from cryptanalytic point of view, from the encrypted speech signals. We also study some of the published cryptanalysis techniques particulary used for text based data and then study the effectiveness of these techniques if the underlying plaintext data is digitized and compressed speech. We discuss a particular situation in stream ciphers called the two time pad situation, assuming the two underlying signals being speech. The two time pad situation is presented at length in the literature with respect to text based data and not discussed at all with respect to secure speech communications. We present techniques for exploitation of two time pad situation in case of stream ciphered digitized speech. Separate techniques for exploitation are presented for waveform (uncompressed) and parameter encoded (compressed) speech. We also analyze the latest techniques of selective encryption applied on compressed speech signals and present that some of these techniques can be effectively employed for content protection but may not conceal the speaker’s identity. In the last part of the thesis we analyze the latest encryption techniques used in voice over IP applications. We discuss that if speech is compressed using variable bit rate encoding resulting into variable length packets can be used for speakers recognition even after encryption. Experimental evaluation results for all the above techniques are presented. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Analysing encrypted speech en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account