HMM Based Privacy Preserving Approach for VOIP Communication

S. Prashantini*, T.J.Jeyaprabha**
* Applied Electronics, Department of ECE, Sri Venkateswara College of Engineering, India.
** Assistant Professor, Department of ECE, Sri Venkateswara College of Engineering, India.
Periodicity:October - December'2013
DOI : https://doi.org/10.26634/jdp.1.4.2597

Abstract

Pre-processing of Speech Signal serves various purposes in any speech processing application. It includes Noise Removal, Endpoint Detection, Pre-emphasis, Framing, Windowing, Echo Canceling etc. Out of these, silence portion removal along with endpoint detection is the fundamental step for applications like Speech and Speaker Recognition. The proposed method uses multi-layerperceptronalong with hierarchal mixturemodel for classification of voiced part of a speech from silence/unvoiced part. The work shows better end point detection as well as silence removal.The study is based on timing-based traffic analysis attacks thatcan be used to reconstruct the communication on end-to-end voip systems by taking advantage of the reduction or suppression of the generation of traffic whenever the sender detects a voice inactivity. Removal of the silence in between the inter packet time in order to obtain a clear communication. The proposed attacks can detect speakers of encrypted speech communications with high probabilities. With the help of different codecs we are going to detect speakers of speech communications In comparison with traditional traffic analysis attacks, the proposed traffic analysis attacks do not require simultaneous accesses to one traffic flow of interest at both sides.

Keywords

Speech Recognition, Silent Suppression, Passive Analysis.

How to Cite this Article?

Prashantini.S., and Jeyaprabha.T.J. (2014). HMM Based Privacy Preserving Approach For VOIP Communication. i-manager’s Journal on Digital Signal Processing, 1(4), 19-26. https://doi.org/10.26634/jdp.1.4.2597

References

[1]. Y.J. Pyun, Y.H. Park, X. Wang, D.S. Reeves, and P. Ning, (2010). “Tracing Traffic through Intermediate Hosts that Repacketize Flows,” Proc.IEEE INFOCOM '07.
[2]. J.W. Deng and H.T. Tsui, (2000). “An HMM-Based Approach for Gesture Segmentation and Recognition,” Proc. Int'l Conf. Pattern Recognition(ICPR '00), pp. 679-682.
[3]. L.R. Rabiner, “A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition,” Proc. IEEE, Vol. 77, No. 2,pp. 267-296.
[4]. R. Bakis, “Continuous Speech Recognition via Centi second Acoustic states,” J. the Acoustical Soc. of Am.
[5]. G. Danezis and A. Serjantov, (2004). “Statistical Disclosure or Intersection Attacks on Anonymity Systems,” Proc. Sixth Information Hiding Workshop (IH '04), pp. 293-308.
[6]. O. Berthold and H. Langos, (2002). “Dummy Traffic Against Long Term Intersection Attacks,” Proc. Privacy Enhancing Technologies Workshop(PET '02), pp. 110-128.
[7]. X. Wang, S. Chen, and S. Jajodia, (2005). “Tracking Anonymous Peer-to-Peer Voip Calls on the Internet,” Proc. 12th ACM Conf. Computer and Comm. Security (CCS '05), pp. 81-91.
[8]. “Audio Signals Used for Experiments, ”http:// academic. csuohio. edu/zhu _y/ isc 2010/instruction.txt.
[9]. Q. Sun, D.R. Simon, Y.-M. Wang, W. Russell, V.N. Padmanabhan,and L. Qiu, (2002). “Statistical Identification of Encrypted Web Browsing Traffic,” Proc. IEEE Symp. Security and Privacy (SP '02), pp. 19-30.
[10]. D. Herrmann, R. Wendolsky, and H. Federrath, (2009). “Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Nai¨ve-Bayes Classifier,” Proc. ACM Workshop Cloud Computing Security (CCSW '09), pp. 31-42.
[11]. L. Lu, E.-C. Chang, and M. Chan, (2010). “Website Fingerprinting and Identification Using Ordered Feature Sequences,” Proc.15th European Conf. Research in Computer Security (ESORICS), D. Gritzalis, B. Preneel, and M. Theoharidou, eds. pp. 199-214.
[12]. C.V. Wright, L. Ballard, S.E. Coull, F. Monrose, and G.M. Masson, (2008).“Spot Me if You Can: Uncovering Spoken Phrases in Encrypted Voip Conversations,” Proc. IEEE Symp. Security and Privacy(SP '08), pp. 35-49.
[13]. C.V. Wright, L. Ballard, F. Monrose, and G.M. Masson, (2007). “Language Identification of Encrypted Voip Traffic: Alejandra y Roberto orAlice and Bob?,” Proc. 16th USENIX Security Symp. USENIX Security Symp., pp. 4:1-4:12, http://portal.acm.org/citationcfm?id=1362903.1362907.
[15]. C. Wright, S. Coull, and F. Monrose, (2009). “Traffic Morphing: An Efficient Defense against Statistical Traffic Analysis,” Proc. Network and Distributed Security Symp. (NDSS '09).
[16]. Network Security M. Backes, G. Doychev, M. Du¨ rmuth, and B. Ko¨ pf, (2010). “Speaker Recognition in Encrypted Voice Streams,” Proc. 15th European Symp. Research in Computer Security (ESORICS '10), pp. 508-523.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.