Purpose. To ensure the exchange of confidential voice information in real time, providing its integrated protection against unauthorized eavesdropping and a significant portion of errors generated by interference in the communication channel.
Specifications. Approaches to decoding a speech signal in the Hamming metric and by linear interpolation are focused on channel types with different statistical properties of interference. The security of a decoder in the Hamming metric is higher than that of a decoder restoring samples using the interpolation method in a communication channel with independent bit errors. In turn, the decoder that restores samples by interpolation is focused on channels with error packetization and provides a greater level of security compared to a decoder in the Hamming metric. The procedure for restoring speech signal samples by interpolation is simpler to implement and requires less resources than restoration in the Hamming metric. The performance of a decoder that reconstructs samples by interpolation is significantly higher for the probability of bit error 10E-3-10E-1. For bit error probability 10E-4-10E-2, the noise accompanying the reconstructed speech signal can be classified as comfort noise.
Application area. Telecommunication systems for secure information transmission. Potential consumers are manufacturers and users of communication equipment.
Advantages. The developed technology ensures the exchange of confidential speech information in real time by factorial coding of data with the necessary ensemble, statistical, structural properties of code sequences and the implementation of a unified procedure for protecting against unauthorized access and interference of the communication channel.
Technical and economic effect. Creation of fundamentally new products to ensure export potential and import substitution. Providing industry or population with a new type of information and communication services.
Description. The technology of non-separated factorial coding of speech signals is aimed at ensuring the exchange of confidential speech information in real time, providing its integrated protection against unauthorized eavesdropping and most of the errors generated by interference in the communication channel.