Prevention of Voice Phishing through Analysis of Telephone Call Voice Characteristic

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Using a phone call to morale of others seeking money as voice phishing. When receiving these fraudulent calls are easily embarrassed, and if they get embarrassed, become more easily be cheated. These voice phishing techniques are evolving to be more intelligent and more diverse. Accordingly, the amount of damage and the victim reality is increasing. The phone call, only the minimum data necessary to transfer the information contained is passed to the other party through the wired or wireless communication networks. In the voice of phone call, It is because the communication system mainly conveys the voice and does not convey the facial expression, environmental situation, and psychological state of the other person. Therefore, it is difficult to judge the authenticity in speech of voice phishing over the telephone network, and it is easy to fall into the deceitful deceit of evolving fraud. In this paper, we analyze the characteristics of voice phishing voices, examine their characteristics, and use them to reduce fraud damage. The voices recorded by victims of actual telephone fraud were analyzed and the characteristics were summarized.

     

     


  • Keywords


    Voice phishing, Phishing prevention, Phone call analysis, Speech analysis.

  • References


      [1] Hyung Woo Park, Myung-Jin Bae, “A Study on Voice phishing Characteristic, Convergence Research Letter,” Vol.1, No.3, October (2015).

      [2] M. J. Bae, Read the world with the sound of Professor Bae-MyeongJin, Korean Publishers. Korea (2013).

      [3] H.W Park, S. G. Bae, M.J Bae, “Analysis of Confidence and Control through Voice of Kim Jung-un's,” INFORMATION, Vol. 19, No. 5, 2016, pp. 1469-1474.

      [4] J.W. Park, H.W Park and S.Mm Lee, “ An Analysis on Reliability Parameter Extraction Using Formant of Voice over Telephone,” Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology, Vol.7, No.3, 2015, pp.183-190.

      [5] Ho-Dae Cho, “Voice Phishing Occurrence and Counterplan,” JOURNAL OF THE KOREA CONTENTS ASSOCIATION, vol.12, No.7, pp.176-182 (2012).

      [6] Fundamentals of Telephone Communication Systems. Western Electric Company. 1969. p. 2.1.

      [7] R. R. Lawrence, R. W. Schafer, Theory and Applications of Dig Digital Speech Processing, PEARSON (2011).

      [8] Myung-Jin Bae, Sang-Hyo Lee, Editor, Digital Voice Analysis. Dongyoung publish (1998).

      [9] H.W. Park, M.S. Kim, M.-J. Bae, "Improving pitch detection through emphasized harmonics in time-domain," Communications in Computer and Information Science(CCIS), Vol. 352, 2012, pp. 184-189.

      [10] Hyung Woo Park, Sang Woo Hahm, “Study on Human Stress of Task Difference with Personality, Advanced Science and Technology Letters,” (2016) Vol.130, pp.98-100 .

      [11] D. R. Feinberg, B. C. Jones, A. C. Little, D. M. Burt & D. I. Perrett, “Manipulations of fundamental and formant frequencies influence the attractiveness of human male voices." Animal Behaviour 69.3 (2005): 561-568.

      [12] Woo Chul Park, Snag Bong Lee and Sun hee Lee, Fundamentals of Sound Engineering, Chasong press (2009).

      [13] Hyun-ju Lee, Dong-il Shin and Dong-kyoo Shin, “The Classification Algorithm of Users’ Emotion Using Brain-Wave ,”(2014),The Journal of The Korean Institute of Communication Sciences 39(2), 122-129.


 

View

Download

Article ID: 18525
 
DOI: 10.14419/ijet.v7i3.33.18525




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.