Methods of forming acoustic jamming for counteraction means against unauthorized documentation of speech information

Authors

DOI:

https://doi.org/10.30837/rt.2026.1.224.12

Keywords:

acoustic protection, speech information, speech-like jam, formant jam, PESQ, STOI, counter-recording, spectral masking

Abstract

The article is devoted to solving the actual problem of protecting confidential speech information by analyzing and improving methods of forming acoustic interference. The aim of the work is to systematize methods of acoustic jamming formation and experimentally substantiate the effectiveness of spectrally balanced and adaptive methods for counteracting unauthorized recording. The article provides a comprehensive analysis of existing approaches, among which white noise, tonal, speech-like, and formant jammers are highlighted. Special attention is paid to the scientific and methodological aspects of jammer synchronization with the useful signal.

Based on software modeling in the Python environment using signal processing libraries, a comparative evaluation of the effectiveness of four types of jammers was conducted. Effectiveness was assessed using a complex of objective metrics: PESQ (Perceptual Evaluation of Speech Quality) and STOI (Short-Time Objective Intelligibility), which provided verified quantitative results. It has been experimentally established that the highest efficiency is provided by the proposed method of formant jamming, which ensures targeted masking of the most informative spectral components of speech. It is calculated that the formant jammer provides the lowest quality scores (PESQ) and intelligibility scores (STOI) compared to other types of jammers. The research on the dependence of the STOI intelligibility index on the distance between the jammer source and the recording device confirmed the critical influence of spatial conditions on information security. The results prove the feasibility of using intelligent jamming formation methods in modern active acoustic protection systems to increase their effectiveness.

References

Засоби та системи технічного захисту інформації: Навчальний посібник для студентів ЗВО / І. Є. Анті-пов, А. М. Олейніков, Ю. В. Ликов, В. Д. Кукуш, І. О. Милютченко. 2-е вид., перероб. і доп. Харків : ХНУРЕ, 2024. 266 с.

Гоков О.М. Фізичні основи технічних засобів розвідки : навч. посіб. Харків : ХНЕУ ім. С. Кузнеця, 2022. 255 с.

Fielder G. D. Acoustical and Vibrational Methods of Information Protection // Journal of the Audio Engineer-ing Society. 1998. Vol. 46, No. 7/8. P. 652–665.

Щербатий В. Д. Методи та засоби активного захисту від несанкціонованого перехоплення мовної інформації / В. Д. Щербатий, М. В. Коваль // Вісник Нац. техн. ун-ту України "КПІ". Сер. Приладобудування. 2019. Вип. 57(1). С. 105–111.

LykovY., Oliinyk A., Zavolodko G. Method of increasing the noise immunity of acoustic suppression systems for speech information // Radioelectronics & Informatics. 2023. No. 3. P. 43–48.

ITU-T Recommendation P.862: Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs // International Telecommuni-cation Union, 2001.

Published

2026-04-30

How to Cite

Oleynikov, A., & Shkopotko, P. (2026). Methods of forming acoustic jamming for counteraction means against unauthorized documentation of speech information. Radiotekhnika, (224), 125–130. https://doi.org/10.30837/rt.2026.1.224.12

Issue

Section

Articles