VoIP-Based Voice Secure Telecommunication Using Speaker Authentication in Telematics Environments

텔레매틱스 환경에서 화자인증을 이용한 VoIP기반 음성 보안통신

  • 김형국 (광운대학교 전파공학과) ;
  • 신동 (광운대학교 전파공학과)
  • Received : 2010.11.23
  • Accepted : 2011.01.13
  • Published : 2011.02.28

Abstract

In this paper, a VoIP-based voice secure telecommunication technology using the text-independent speaker authentication in the telematics environments is proposed. For the secure telecommunication, the sender's voice packets are encrypted by the public-key generated from the speaker's voice information and submitted to the receiver. It is constructed to resist against the man-in-the middle attack. At the receiver side, voice features extracted from the received voice packets are compared with the reference voice-key received from the sender side for the speaker authentication. To improve the accuracy of text-independent speaker authentication, Gaussian Mixture Model(GMM)-supervectors are applied to Support Vector Machine (SVM) kernel using Bayesian information criterion (BIC) and Mahalanobis distance (MD).

본 논문은 텔레매틱스 환경에서 문장독립형 화자인증을 이용한 VoIP 음성 보안통신기술을 제안한다. 보안통신을 위해 송신측에서는 화자의 음성정보로부터 생성된 공개키를 통해 음성 패킷을 암호화하여 수신측에 전송함으로써 중간자 공격에 대항한다. 수신측에서는 수신된 암호화된 음성패킷을 복호화한 후에 추출된 음성 특징과 송신측으로부터 수신받은 음성키를 비교하여 화자인증을 수행한다. 제안된 방식에서는 Gaussian Mixture Model(GMM)-supervector를 Bayesian information criterion (BIC) 방식과 Mahalanobis distance (MD) 방식을 이용한 Support Vector Machine (SVM) 커널에 적용하여 문장독립형 화자인증 정확도를 향상시켰다.

Keywords

References

  1. B. H. Song, K. S. Chung and Y. T. Shin, "SRTP: TCP-friendly congestion control for multimedia streaming," Lecture Notes in Computer Science Springer-Verlag Press, vol.2344, pp.529-538, Sep. 2002.
  2. M. E. Hellman, "An overview of public key cryptography." IEEE Communications Magazine, pp.42-49, May 2002.
  3. D. J. Kim and K. S. Hong, "Multimodal biometric authentication using teeth image and voice in mobile environment," IEEE transactions on Consumer Electronics, vol.54, no.4, pp.1790-1797, Nov. 2008. https://doi.org/10.1109/TCE.2008.4711236
  4. M. R. Enayah and A. Samsudin, "Securing telecommunication based on speaker voice as the public key," IJCSNS, pp.201-210, 2007.
  5. P. Delacourt and C. J. Wellekens, "DISTBIC: a speaker-based segmentation for audio data indexing," Elsevier Speech Communication, vol.32, pp.111-126, Sep. 2000. https://doi.org/10.1016/S0167-6393(00)00027-3
  6. R. D. Maesschalck, D. Jouan-Rimbaud and D. L. Massart, "Tutorial the Mahalanobis distance," Elsevier Chemometrics and Intelligent Laboratory systems, vol.50, pp.1-18, 2000. https://doi.org/10.1016/S0169-7439(99)00047-7
  7. W. M. Campbell, D. E. Sturim and D. A. Reynolds, "Support vector machines using GMM supervectors for speaker verification," IEEE Signal Process. Lett., vol.13, no.5 pp.308-311, May 2006.