Overview
- Discusses the threats to the voice processing systems
- Provides an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion
- Proposes an acoustic system to reduce the effects from the spectrum reduction attacks
Part of the book series: SpringerBriefs in Computer Science (BRIEFSCOMPUTER)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes.
First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones, and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems.
This book is intended for security researchers, computer scientists, and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security, and audio security. Advanced-level students who are studying these topics will benefit from this book as well.
Similar content being viewed by others
Keywords
- Speech recognition
- Security and privacy
- Voice processing system
- Malicious voice attack
- Speaker identification
- audio security
- biometrics
- replay attack
- IoT security
- digital signal processing
- spectrum compensation
- driverless car
- acoustic propagation
- machine learning
- adversarial audio
- time differences of arrival
- discrete Fourier transform
- filter estimation
- frequency response
Table of contents (5 chapters)
Authors and Affiliations
About the authors
Shu Wang is a Ph.D. Candidate in the Department of Information Sciences and Technology at George Mason University. His research interests lie primarily in the fields of artificial intelligence (AI) and computer security. In particular, his research focuses on the mitigation of attack surfaces in voice processing systems (biometrics security) and open-source software (software security). His past research projects involve computer vision, natural language processing, and digital signal processing. His research papers appear in IEEE S&P, ACM CCS, RAID, IEEE DSN, IEEE INFOCOM, IEEE ICSME, Computers & Security, etc. Previously, He obtained my bachelor’s degree in Communication Engineering and master’s degree in Signal and Information Processing from Nanjing University of Posts and Telecommunications.
Bibliographic Information
Book Title: Secure Voice Processing Systems against Malicious Voice Attacks
Authors: Kun Sun, Shu Wang
Series Title: SpringerBriefs in Computer Science
DOI: https://doi.org/10.1007/978-3-031-44748-8
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2024
Softcover ISBN: 978-3-031-44747-1Published: 31 October 2023
eBook ISBN: 978-3-031-44748-8Published: 30 October 2023
Series ISSN: 2191-5768
Series E-ISSN: 2191-5776
Edition Number: 1
Number of Pages: XVI, 111
Number of Illustrations: 34 b/w illustrations
Topics: Privacy, Biometrics