Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

11/16/2018
by   Yuan Gong, et al.
0

Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. Existing defense techniques can usually only protect from a specific type of attack or require an additional authentication step that involves another device. Such defense strategies are either not strong enough or lower the usability of the system. Based on the fact that legitimate voice commands should only come from humans rather than a playback device, we propose a novel defense strategy that is able to detect the sound source of a voice command based on its acoustic features. The proposed defense strategy does not require any information other than the voice command itself and can protect a system from multiple types of spoofing attacks. Our proof-of-concept experiments verify the feasibility and effectiveness of this defense strategy.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 7

page 8

page 9

research
03/24/2018

An Overview of Vulnerabilities of Voice Controlled Systems

Over the last few years, a rapidly increasing number of Internet-of-Thin...
research
09/19/2023

Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks

Automatic Speaker Verification (ASV) systems are increasingly used in vo...
research
09/09/2022

Defend Data Poisoning Attacks on Voice Authentication

With the advances in deep learning, speaker verification has achieved ve...
research
10/15/2020

Progressive Defense Against Adversarial Attacks for Deep Learning as a Service in Internet of Things

Nowadays, Deep Learning as a service can be deployed in Internet of Thin...
research
10/06/2022

PSVRF: Learning to restore Pitch-Shifted Voice without reference

Pitch scaling algorithms have a significant impact on the security of Au...
research
05/08/2020

Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception

Resource constrained Internet-of-Things (IoT) devices are highly likely ...
research
07/16/2023

CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions

The proliferation of the Internet and mobile devices has resulted in mal...

Please sign up or login with your details

Forgot password? Click here to reset