You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones

被引:82
作者
Chen, Si [1 ,2 ]
Ren, Kui [1 ]
Piao, Sixu [1 ]
Wang, Cong [3 ]
Wang, Qian [4 ]
Weng, Jian [5 ]
Su, Lu [1 ]
Mohaisen, Aziz [1 ]
机构
[1] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14620 USA
[2] West Chester Univ, Dept Comp Sci, W Chester, PA 19382 USA
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[4] Wuhan Univ, Sch Comp Sci, Wuhan, Hubei, Peoples R China
[5] Jinan Univ, Sch Informat Sci & Technol, Guangzhou, Guangdong, Peoples R China
来源
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) | 2017年
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
SPEAKER RECOGNITION;
D O I
10.1109/ICDCS.2017.133
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Voice, as a convenient and efficient way of information delivery, has a significant advantage over the conventional keyboard-based input methods, especially on small mobile devices such as smartphones and smartwatches. However, the human voice could often be exposed to the public, which allows an attacker to quickly collect sound samples of targeted victims and further launch voice impersonation attacks to spoof those voice-based applications. In this paper, we propose the design and implementation of a robust software-only voice impersonation defense system, which is tailored for mobile platforms and can be easily integrated with existing off-the-shelf smart devices. In our system, we explore magnetic field emitted from loudspeakers as the essential characteristic for detecting machine-based voice impersonation attacks. Furthermore, we use a state-of-the-art automatic speaker verification system to defend against human imitation attacks. Finally, our evaluation results show that our system achieves simultaneously high accuracy (100%) and low equal error rates (EERs) (0%) in detecting the machine-based voice impersonation attack on smartphones.
引用
收藏
页码:183 / 195
页数:13
相关论文
共 48 条
  • [31] Rodgers J., Adobe voco - should we be afraid?
  • [32] Roy Nirupam., 2014, Mobisys
  • [33] Shang Wei., 2010, ICASSP
  • [34] Shawe-Taylor J., 2000, INTRO SUPPORT VECTOR, V204
  • [35] Shirvanian M., 2014, ACM CCS
  • [36] Modeling prosodic feature sequences for speaker recognition
    Shriberg, E
    Ferrer, L
    Kajarekar, S
    Venkataraman, A
    Stolcke, A
    [J]. SPEECH COMMUNICATION, 2005, 46 (3-4) : 455 - 472
  • [37] Stylianou Y., 2009, ICASSP
  • [38] An Overview of Speaker Identification: Accuracy and Robustness Issues
    Togneri, Roberto
    Pullella, Daniel
    [J]. IEEE CIRCUITS AND SYSTEMS MAGAZINE, 2011, 11 (02) : 23 - 61
  • [39] Vandermeulen Dries., 2013, AMBIENT
  • [40] Villalba J., 2011, BIOMETRICS ID MANAGE