Analog scramblers for speech privacy

Abstract Despite significant strides in digital speech technology, scrambling of the analog speech signal continues to be an important method for achieving casual privacy in many classes of voice communications systems. This paper explains the principles of important classes of analog speech scramblers, with emphasis on algorithms that possess demonstrated robustness in the context of real-channel operation. At the forefront of the art are so-called two-dimensional analog scramblers that manipulate the speech signal in both time and frequency domains, to obtain impressive combinations of residual intelligibility, communication delay and transmission robustness. Our review includes several examples of such two-dimensional algorithms.

[1]  G. A. Miller,et al.  The intelligibility of speech as a function of the context of the test materials. , 1951, Journal of experimental psychology.

[2]  R. Crochiere,et al.  Speech Coding , 1979, IEEE Transactions on Communications.

[3]  C. A. McGonegal,et al.  Digital signal processor: Private communications , 1981, The Bell System Technical Journal.

[4]  D. Esteban,et al.  Application of quadrature mirror filters to split band voice coding schemes , 1977 .

[5]  AARON D. WYNER An analog scrambling scheme which does not expand bandwidth, Part II: Continuous time , 1979, IEEE Trans. Inf. Theory.

[6]  Rein Turn Privacy Systems for Telecommunication Networks , 1974 .

[7]  R. V. Cox,et al.  Analog voice privacy systems using TFSP scrambling: Full duplex and half duplex , 1983, The Bell System Technical Journal.

[8]  Robert E Nelson,et al.  A guide to voice scramblers for law enforcement agencies , 1976 .

[9]  Aaron D. Wyner An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time , 1979, IEEE Trans. Inf. Theory.

[10]  S. Kak,et al.  On speech encryption using waveform scrambling , 1977, Bell Labs technical journal.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  V. J. Phillips,et al.  Speech scrambling by the re-ordering of amplitude samples , 1971 .

[13]  M. Orceyre,et al.  An approach to secure voice communication based on the data encryption standard , 1978, IEEE Communications Society Magazine.

[14]  N.R.F. MacKinnon The development of speech encipherment , 1980 .

[15]  D. Kahn Cryptology goes public , 1980, IEEE Communications Magazine.

[16]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[18]  R. V. Cox,et al.  Analog scramblers for speech based on sequential permutations in time and frequency , 1983, The Bell System Technical Journal.

[19]  Nuggehally Sampath Jayant,et al.  A Comparison of Four Methods for Analog Speech Privacy , 1981, IEEE Trans. Commun..

[20]  B Blesser,et al.  Speech perception under conditions of spectral transformation. I. Phonetic characteristics. , 1972, Journal of speech and hearing research.