Fast training of support vector machines using sequential minimal optimization
Advances in kernel methods
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Voice over IPsec: Analysis and Solutions
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
A tutorial on support vector regression
Statistics and Computing
Ensembles of nested dichotomies for multi-class problems
ICML '04 Proceedings of the twenty-first international conference on Machine learning
A tutorial on text-independent speaker verification
EURASIP Journal on Applied Signal Processing
Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob?
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Discriminative parameter learning for Bayesian networks
Proceedings of the 25th international conference on Machine learning
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
ICASSP '09 Proceedings of the 2009 IEEE International Conference on Acoustics, Speech and Signal Processing
NIST Speaker Recognition Evaluations Utilizing the Mixer Corpora—2004, 2005, 2006
IEEE Transactions on Audio, Speech, and Language Processing
Speaker recognition in encrypted voice streams
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Hidden VoIP calling records from networking intermediaries
Principles, Systems and Applications of IP Telecommunications
Crypt analysis of two time pads in case of compressed speech
Computers and Electrical Engineering
A novel speech content authentication algorithm based on Bessel-Fourier moments
Digital Signal Processing
International Journal of Speech Technology
Hi-index | 0.00 |
Most of the voice over IP (VoIP) traffic is encrypted prior to its transmission over the Internet. This makes the identity tracing of perpetrators during forensic investigations a challenging task since conventional speaker recognition techniques are limited to un-encrypted speech communications. In this paper, we propose techniques for speaker identification and verification from encrypted VoIP conversations. Our experimental results show that the proposed techniques can correctly identify the actual speaker for 70-75% of the time among a group of 10 potential suspects. We also achieve more than 10 fold improvement over random guessing in identifying a perpetrator in a group of 20 potential suspects. An equal error rate of 17% in case of speaker verification on the CSLU speaker recognition corpus is achieved.