2018 27th International Conference on Computer Communication and Networks (ICCCN) 2018
DOI: 10.1109/icccn.2018.8487334
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

Abstract: Over the last few years, a rapidly increasing number of Internet-of-Things (IoT) systems that adopt voice as the primary user input have emerged. These systems have been shown to be vulnerable to various types of voice spoofing attacks. Existing defense techniques can usually only protect from a specific type of attack or require an additional authentication step that involves another device. Such defense strategies are either not strong enough or lower the usability of the system. Based on the fact that legit… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 36 publications
(93 reference statements)
0
25
0
Order By: Relevance
“…In order to defend against these attacks, the work presented in [9] and [10] each proposes a defense strategy to protect VCSs by identifying the sound source of the received voice commands and rejecting those that are not from a human speaker, merely by analyzing the acoustic cues within the voice commands. This approach is based on the observation that legitimate voice commands should only come from human speakers rather than a playback device and that attacks such as self-triggered attacks, hidden voice commands, and audio adversarial examples rely on a playback device.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…In order to defend against these attacks, the work presented in [9] and [10] each proposes a defense strategy to protect VCSs by identifying the sound source of the received voice commands and rejecting those that are not from a human speaker, merely by analyzing the acoustic cues within the voice commands. This approach is based on the observation that legitimate voice commands should only come from human speakers rather than a playback device and that attacks such as self-triggered attacks, hidden voice commands, and audio adversarial examples rely on a playback device.…”
Section: Introductionmentioning
confidence: 99%
“…That is, we are able to leverage the differences in the sound production mechanisms of humans and playback devices, which lead to differences in the frequencies and the directivity of the output voice signal. For example, in [9], the authors leverage the presence of significant low-frequency signals to distinguish electronic speakers from human speakers, while in [10], the authors use a combination of features includ- 1 Data available at https://github.com/yuangongnd/remasc ing fundamental frequency and Mel-frequency cepstral coefficients (MFCCs), and propose a data-driven approach.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations