<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2021-6-1-0-3</article-id><article-id pub-id-type="publisher-id">2372</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>APPLICATION OF THE VOICE IDENTIFICATION METHOD ADAPTED TO THE QUIET PRESENCE OF PASSWORD PHRASES TO COUNTER THE LEAKAGE OF SPEECH INFORMATION</article-title><trans-title-group xml:lang="en"><trans-title>APPLICATION OF THE VOICE IDENTIFICATION METHOD ADAPTED TO THE QUIET PRESENCE OF PASSWORD PHRASES TO COUNTER THE LEAKAGE OF SPEECH INFORMATION</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Vasiliev</surname><given-names>Roman Aleksandrovich</given-names></name><name xml:lang="en"><surname>Vasiliev</surname><given-names>Roman Aleksandrovich</given-names></name></name-alternatives><email>romangamma@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2021</year></pub-date><volume>6</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2021/1/ИТ_3.pdf" /><abstract xml:lang="ru"><p>The article discusses the features of biometric voice identification under the condition of quiet pronunciation of password phrases. Biometric voice identification differs significantly from standard identification systems and access control systems using symbolic passwords and keys. Biometric voice identification is based on unique and individual characteristics of identity and virtually eliminates the possibility of unauthorized actions associated with loss, theft or transfer of the password to third parties. The widespread use of biometric voice identification systems entails increased interest on the part of malefactors. The most frequent are attacks using previously used biometric features, for example, audio recording of a passphrase. To minimize the attacks described above, a biometric voice identification method, based on the whitening filter method, adapted to the quiet pronunciation of passphrases has been proposed. Described is the software implementation of the proposed method - &amp;quot;Information system for identifying speakers by voice&amp;quot;, which allows biometric identification by voice, provided that password phrases are quietly uttered to counteract the leakage of speech information through acoustic channels.</p></abstract><trans-abstract xml:lang="en"><p>The article discusses the features of biometric voice identification under the condition of quiet pronunciation of password phrases. Biometric voice identification differs significantly from standard identification systems and access control systems using symbolic passwords and keys. Biometric voice identification is based on unique and individual characteristics of identity and virtually eliminates the possibility of unauthorized actions associated with loss, theft or transfer of the password to third parties. The widespread use of biometric voice identification systems entails increased interest on the part of malefactors. The most frequent are attacks using previously used biometric features, for example, audio recording of a passphrase. To minimize the attacks described above, a biometric voice identification method, based on the whitening filter method, adapted to the quiet pronunciation of passphrases has been proposed. Described is the software implementation of the proposed method - &amp;quot;Information system for identifying speakers by voice&amp;quot;, which allows biometric identification by voice, provided that password phrases are quietly uttered to counteract the leakage of speech information through acoustic channels.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>biometric voice identification</kwd><kwd>whitening filter method</kwd><kwd>acoustic speech intelligence</kwd></kwd-group><kwd-group xml:lang="en"><kwd>biometric voice identification</kwd><kwd>whitening filter method</kwd><kwd>acoustic speech intelligence</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1.&amp;nbsp;&amp;nbsp;&amp;nbsp; Nikolaev D.B, Vasiliev R.A. Analysis of the possibility of using voice identification in systems for differentiating access to information // Research result. Information technologies. &amp;ndash; 2016. &amp;ndash; T. 1. &amp;ndash; Issue 1. &amp;ndash; P. 48-57.</mixed-citation></ref><ref id="B2"><mixed-citation>2.&amp;nbsp;&amp;nbsp;&amp;nbsp; Savchenko V.V., Vasiliev R.A. Analysis of the emotional state of the speakers by voice based on the phonetic lie detector // Scientific Bulletin of Belgorod State University. &amp;ndash; 2014. &amp;ndash; Issue. &amp;ndash; No. 21 (192). &amp;ndash; P. 186-195.</mixed-citation></ref><ref id="B3"><mixed-citation>3.&amp;nbsp;&amp;nbsp;&amp;nbsp; Vasiliev R.A. Svid. about the state. registration of the computer program No. 2015663306. Program for the identification of speakers by voice // Vasiliev R.А. Registered. 15.12.2015 &amp;ndash; M.: Rospatent, 2015.</mixed-citation></ref><ref id="B4"><mixed-citation>4.&amp;nbsp;&amp;nbsp;&amp;nbsp; Buzov GA Protection from information leakage through technical channels. &amp;ndash; M., 2005.</mixed-citation></ref><ref id="B5"><mixed-citation>5.&amp;nbsp;&amp;nbsp;&amp;nbsp; Tsypkin Ya.Z. Adaptation and training in automatic systems. Moscow: Nauka, 1968.</mixed-citation></ref><ref id="B6"><mixed-citation>6.&amp;nbsp;&amp;nbsp;&amp;nbsp; Savchenko V.V. Information theory of speech perception. // Izv. universities of Russia. Radio electronics. 2007. &amp;ndash; Issue. 6, pp. 3&amp;ndash;9.</mixed-citation></ref><ref id="B7"><mixed-citation>7.&amp;nbsp;&amp;nbsp;&amp;nbsp; Savchenko V.V. Information-theoretic substantiation of the Gaussian signal model in problems of automatic speech recognition. // Izv. universities of Russia. Radio electronics. 2008. &amp;ndash;Issue. 1. &amp;ndash; P. 24&amp;ndash;33.</mixed-citation></ref><ref id="B8"><mixed-citation>8.&amp;nbsp;&amp;nbsp;&amp;nbsp; Savchenko V.V., Akat&amp;#39;ev D.Yu., Karpov N.V. Automatic recognition of elementary speech units by the whitening filter method // Izv. universities of Russia. Radio electronics. 2007. Issue 4. P. 11-19.</mixed-citation></ref><ref id="B9"><mixed-citation>9.&amp;nbsp;&amp;nbsp;&amp;nbsp; Potapova RK Speech: communication, information, cybernetics: Textbook, manual. 2nd ed. &amp;ndash; M.: Editorial URSS, 2001.</mixed-citation></ref><ref id="B10"><mixed-citation>10.&amp;nbsp; Kullback S. Information theory and statistics. Moscow: Nauka, 1967.</mixed-citation></ref><ref id="B11"><mixed-citation>11.&amp;nbsp; Vasiliev R.A. Biometric identification of users of information systems based on a cluster model of elementary speech units: Dis. ... to those of those. sciences. M., 2017.153 p.</mixed-citation></ref><ref id="B12"><mixed-citation>12.&amp;nbsp; Vasiliev R.A. Investigation of the phonetic structure of speech and identification of speakers by voice // Security of information technologies. 2013. &amp;ndash; T. 20. &amp;ndash;No. 1. &amp;ndash; P. 85-86.</mixed-citation></ref><ref id="B13"><mixed-citation>13.&amp;nbsp; Vasiliev R.A. Investigation of the peculiarities of the phonetic structure of speech and text-independent identification of speakers by continuous speech // Information security of regions. &amp;ndash; 2012. &amp;ndash; No. 2(11). &amp;ndash; P. 57-63.</mixed-citation></ref><ref id="B14"><mixed-citation>14.&amp;nbsp; Vasiliev R.A. Application of methods of phonetic analysis of speech for identifying emotionally stable and unstable university students // Scientific result // Series: Information technologies. Belgorod State University. 2020. &amp;ndash;Vol. 5. &amp;ndash; No. 2. &amp;ndash; P. 9-17.</mixed-citation></ref><ref id="B15"><mixed-citation>15.&amp;nbsp; Volobuev SV Otsenka acoustical security with the use of tools. // Security systems for communications and telecommunications. &amp;ndash; 1999. &amp;ndash; № 25. &amp;ndash; P. 38-45.</mixed-citation></ref><ref id="B16"><mixed-citation>16. Agranovsky A.B., Lednov D.A. Method of text-independent user identification based on the individuality of pronunciation of vowel sounds // Acoustics and Applied Linguistics: Yearbook of the Russian Academy of Education. &amp;ndash; M.: 2002. &amp;ndash; Issue 3. &amp;ndash; P. 103-115.</mixed-citation></ref><ref id="B17"><mixed-citation>17. Garofolo J., Auzanne G., and Voorhees E. The trec spoken document retrieval track: A success story. // In proceedings of the Recherche d&amp;#39;Informations Assiste par Ordinateur: Content Based Multimedia Information Access Conference, 2000. &amp;ndash; pp. 1-20.</mixed-citation></ref><ref id="B18"><mixed-citation>18. Gray A., Markel J. Distance measures for speech processing // IEEE Trans. On Acoust., Speech and Lang. processing. oct. 1976. &amp;ndash; Vol. 24(5) &amp;ndash; p. 291-380.</mixed-citation></ref><ref id="B19"><mixed-citation>19. Mamou J., Mass Y., Ramabhadran B., Sznajder B. Combination of multiple speech transcription methods for vocabulary independent search // In proceedings of the ACM SIGIR Workshop `Searching Spontaneous Conversational Speech. Singapore. &amp;ndash; 2008. &amp;ndash; pp. 20-27.</mixed-citation></ref><ref id="B20"><mixed-citation>20. Huijbregts M., Ordelman R., Jong F. Annotation of heterogeneous multimedia content using automatic speech recognition // In Proceedings of the second international conference on Semantics And digital Media Technologies (SAMT). Lecture Notes in Computer Science. Berlin Springer Verlag. December 2007. &amp;ndash; pp. 78-90.</mixed-citation></ref></ref-list></back></article>