Methods of forming acoustic jamming for counteraction means against unauthorized documentation of speech information
DOI:
https://doi.org/10.30837/rt.2026.1.224.12Keywords:
acoustic protection, speech information, speech-like jam, formant jam, PESQ, STOI, counter-recording, spectral maskingAbstract
The article is devoted to solving the actual problem of protecting confidential speech information by analyzing and improving methods of forming acoustic interference. The aim of the work is to systematize methods of acoustic jamming formation and experimentally substantiate the effectiveness of spectrally balanced and adaptive methods for counteracting unauthorized recording. The article provides a comprehensive analysis of existing approaches, among which white noise, tonal, speech-like, and formant jammers are highlighted. Special attention is paid to the scientific and methodological aspects of jammer synchronization with the useful signal.
Based on software modeling in the Python environment using signal processing libraries, a comparative evaluation of the effectiveness of four types of jammers was conducted. Effectiveness was assessed using a complex of objective metrics: PESQ (Perceptual Evaluation of Speech Quality) and STOI (Short-Time Objective Intelligibility), which provided verified quantitative results. It has been experimentally established that the highest efficiency is provided by the proposed method of formant jamming, which ensures targeted masking of the most informative spectral components of speech. It is calculated that the formant jammer provides the lowest quality scores (PESQ) and intelligibility scores (STOI) compared to other types of jammers. The research on the dependence of the STOI intelligibility index on the distance between the jammer source and the recording device confirmed the critical influence of spatial conditions on information security. The results prove the feasibility of using intelligent jamming formation methods in modern active acoustic protection systems to increase their effectiveness.
References
Засоби та системи технічного захисту інформації: Навчальний посібник для студентів ЗВО / І. Є. Анті-пов, А. М. Олейніков, Ю. В. Ликов, В. Д. Кукуш, І. О. Милютченко. 2-е вид., перероб. і доп. Харків : ХНУРЕ, 2024. 266 с.
Гоков О.М. Фізичні основи технічних засобів розвідки : навч. посіб. Харків : ХНЕУ ім. С. Кузнеця, 2022. 255 с.
Fielder G. D. Acoustical and Vibrational Methods of Information Protection // Journal of the Audio Engineer-ing Society. 1998. Vol. 46, No. 7/8. P. 652–665.
Щербатий В. Д. Методи та засоби активного захисту від несанкціонованого перехоплення мовної інформації / В. Д. Щербатий, М. В. Коваль // Вісник Нац. техн. ун-ту України "КПІ". Сер. Приладобудування. 2019. Вип. 57(1). С. 105–111.
LykovY., Oliinyk A., Zavolodko G. Method of increasing the noise immunity of acoustic suppression systems for speech information // Radioelectronics & Informatics. 2023. No. 3. P. 43–48.
ITU-T Recommendation P.862: Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs // International Telecommuni-cation Union, 2001.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).

