4.8 Article

Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 7, 页码 5304-5314

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3110588

关键词

Neural networks; Internet of Things; Smart devices; Numerical models; Smart phones; Security; Performance evaluation; Defense; impersonation attack; smart devices; speech verification; voice characteristics

资金

  1. Natural Science Foundation of Hunan [2021JJ40119]

向作者/读者索取更多资源

The research aims to propose a universal defense scheme against voice impersonation attacks, based on the VI data set collected from the TV show "The Sound". Results indicate that the proposed QGD scheme outperforms other state-of-the-art schemes in terms of accuracy.
Both voice communication and automatic speech verification (ASV) over smart devices are vulnerable to the voice impersonation (VI) attack, which is often launched via imitating a target's voice characteristics to deceive human auditory sense or fool the ASV system. Researchers have designed a number of defense schemes yet without the consideration of universality due to the lack of comprehensive data sets. In this article, we propose a universal defense scheme based on the VI data set collected from a famous TV show named The Sound. First, we deliver a thorough study on the VI attacks in both auditory and ASV systems to verify the collected simulated voice could spoof the auditory and the ASV system with a notable probability. Second, we propose a quasi-Gaussian distribution (QGD)-based defense scheme with the discovery about specific voice characteristics that are distinct between attackers and targets. Finally, we conduct extensive experimental results on our collected VI data set as well as the auxiliary ASVspoof2017 data set, to indicate the proposed QGD scheme outperforms the state-of-the-art schemes: backpropagation neural network, support vector machine, and Gaussian mixture model, in terms of accuracy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据