Sequential Tests for the Detection of Voice Activity and the Recognition of Cyber Exploits
Ehab Etellisi, P. Papantoni-Kazakos
.
DOI: 10.4236/cn.2011.34022   PDF    HTML     4,038 Downloads   7,471 Views   Citations

Abstract

We consider the problem of automated voice activity detection (VAD), in the presence of noise. To attain this objective, we introduce a Sequential Detection of Change Test (SDCT), designed at the independent mixture of Laplacian and Gaussian distributions. We analyse and numerically evaluate the proposed test for various noisy environments. In addition, we address the problem of effectively recognizing the possible presence of cyber exploits in the voice transmission channel. We then introduce another sequential test, designed to detect rapidly and accurately the presence of such exploits, named Cyber Attacks Sequential Detection of Change Test (CA-SDCT). We analyse and numerically evaluate the latter test. Experimental results and comparisons with other proposed methods are also presented.

Share and Cite:

E. Etellisi and P. Papantoni-Kazakos, "Sequential Tests for the Detection of Voice Activity and the Recognition of Cyber Exploits," Communications and Network, Vol. 3 No. 4, 2011, pp. 185-199. doi: 10.4236/cn.2011.34022.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] J.-W. Shin, H.-J. Kwon, S.-H. Jin and N. S. Kim, “Voice Activity Detection Based on Conditional MAP Criterion,” IEEE Signal Processing Letters, Vol. 15, 2008, pp. 257-260.
[2] J. Sohn, N.-S. Kim and W.-Y. Sung, “A Statistical Model-Based Voice Activity Detection,” IEEE Signal Processing Letters, Vol. 6, No. 1, 1999, pp. 1-3.
[3] J.-W. Shin, J.-H. Chang, H.-S. Yun and N.-S. Kim, “Voice Activity Detection Based on Generalized Gamm Distribution,” Vol. 1, 2005, pp. 781-784.
[4] S. Gazor and W. Zhang, “Speech Probability Distribution,” IEEE Signal Processing, Vol. 10, No. 7, 2003, pp. 204-207. doi:10.1109/LSP.2003.813679
[5] R. K. Bansal and P. Papantoni-Kazakos, “An Algorithm for Detecting a Change in a Stochastic Process,” IEEE Transaction on Information Theory, Vol. IT-32, No. 2, 1986, pp. 227-235.
[6] A. T. Burrell and P. Papantoni-Kazakos, “Extended Sequential Algorithms for Detecting Changes in Acting Stochastic Processes,” IEEE Transaction on Systems, Man, and Cybernetics, Vol. 28, No. 5, 1998, pp. 703-710. doi:10.1109/3468.709621
[7] A. T. Burrell and P. Papantoni-Kazakos, “Detecting Software Faults in Distributed Systems,” IEEE 2009 World Congress on Computer Science and Information Engineering, Vol. 7, 2009, pp. 300-304.
[8] P. Papantoni-Kazakos, “Algorithms for-Monitoring Changes in Quality of Communication Links,” IEEE Transaction on Communication, Vol. COM-27, 1979, pp. 682-692.
[9] D. Kazakos and P. Papantoni-Kazakos, “Detection and Estimation,” Computer Science Press, New York, 1990.
[10] P. Papantoni-Kazakos, “Algorithms for Monitoring Changes in Quality of Communication Links,” IEEE Transactions on Communication, Vol. COM-27, 1979, pp. 656-659.
[11] A. Benyassine, E. Shlomot, H.-Y. Su, D. Massaloux, C. Lamblin and J.-P. Petit, “ITU-T Recommendation G.729 Annex B: A Silence Compression Scheme for Use with G.729 Optimized for V.70 Digital Simultaneous Voice and Data Applications,” Communications Magazine, IEEE, Vol. 35, No. 9, 1996, pp. 64-73.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.