skip to main content
10.1145/3448734.3450471acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdtmisConference Proceedingsconference-collections
research-article

Defensive Measure of Audio Secret Communication Based on Beamforming

Published: 17 May 2021 Publication History

Abstract

Beamforming is a common processing tool in signal processing to produce energy focused and directional focused signals. In this paper, it used to process acoustic and ultrasonic waves to achieve directional and secure transmission of speech. Automatic speaker verification (ASV) systems are an important part of realizing human-computer interaction and the key to secure and reliable communication, which is currently facing challenges due to the birth of various acoustic stealth communication methods. We consider the risks posed by the communication method proposed in this paper to the special "group" of voice intelligent assistant devices, and propose effective defensive measures by tracing the principles and scenarios of the communication method, improving the Mel Frequency Cepstrum Coefficient (MFCC) feature extraction method by combining Hilbert-Huang Transformation (HHT) and using machine learning classification algorithms to confirm. The effectiveness of the defense method is confirmed and the improved feature extraction method improves the defense performance.

References

[1]
H. Wen, P. Ho and G. Gong, “A Novel Framework for Message Authentication in Vehicular Communication Networks,” GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, Honolulu, HI, pp. 1-6, 2009.
[2]
G. Zhang, “Dolphinattack: Inaudible voice commands,” in Proceedings of the 2017 ACM SIGSAC, CCS, pp. 103–117, 2017.
[3]
S. K. Ergünay, E. Khoury, A. Lazaridis and S. Marcel, “On the vulnerability of speaker verification to realistic voice spoofing,” 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS), Arlington, VA, pp. 1-6,2015
[4]
M. Sun, X. Qing, Nasimuddin, X. Peng and Z. Ning Chen, “Millimeter Wave Planar Full-range Switched Beam Grid Array Antenna and its Smart Car Radar Applications,” 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singapore, pp. 15-16, 2018.
[5]
Westervelt, and J. Peter . “Parametric Acoustic Array,” The Journal of the Acoustical Society of America,vol. 35, no. 4, pp. 535-537,1963.
[6]
Berktay, H. O. “Possible Exploitation of Non-Linear Acoustics in Underwater Transmitting Applications,” the Journal of SoundVib, vol. 2, no. 4, pp. 435-461, 1965.
[7]
W. Liu, H. Wen, S Chen. “Stealth Secure Communication Method in Subliminal Channel Based on Acoustic Wave,” Communications Technology, vol. 52, no. 02, pp. 418-422, 2019.
[8]
H. Wen, J Tang, J Wu, H Song and T Wu, “A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT),” in IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 1, pp. 119-126, 2015.
[9]
R. Liao, H.Wen, J Wu, H Song and F Pan. “The Rayleigh Fading Channel Prediction via Deep Learning,” Wireless Communications and Mobile Computing 2018(2018):1-11,2018.
[10]
H. Wen, Y. Wang, X. Zhu, J. Li, “Physical layer assist authentication technique for smart meter system,” IET Communications, vol. 7, no. 3, pp. 189-197, 2013.
[11]
L. Hu, “Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things,” in IEEE Internet of Things Journal, vol. 5, no. 1, pp. 219-228, Feb. 2018.
[12]
H. Wen, S. Li, X. Zhu and L. Zhou, “A framework of the PHY-layer approach to defense against security threats in cognitive radio networks,” in IEEE Network, vol. 27, no. 3, pp. 34-39, May-June 2013.
[13]
Y. Xie, H. Wen, B. Wu, Y. Jiang and J. Meng, “A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing,” in IEEE Transactions on Cloud Computing, vol. 7, no. 2, pp. 383-391, 2019.
[14]
B. Ji, Y. Li, B. Zhou, C. Li, K. Song and H. Wen, “Performance Analysis of UAV Relay Assisted IoT Communication Network Enhanced With Energy Harvesting,” in IEEE Access, vol. 7, pp. 38738-38747, 2019
[15]
S. Chen, “Internet of Things Based Smart Grids Supported by Intelligent Edge Computing,” in IEEE Access, vol. 7, pp. 74089-74102, 2019.
[16]
F. Wang, Dingde Jiang, Hong Wen and Houbing Song. “Adaboost-based security level classification of mobile intelligent terminals.” Journal of Supercomputing,vol. 75, no. 11, pp. 7460–7478, 2019.

Index Terms

  1. Defensive Measure of Audio Secret Communication Based on Beamforming
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CONF-CDS 2021: The 2nd International Conference on Computing and Data Science
      January 2021
      1142 pages
      ISBN:9781450389570
      DOI:10.1145/3448734
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 May 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Beamforming
      2. MFCC
      3. machine learning
      4. security
      5. voice smart assistant

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      CONF-CDS 2021

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 46
        Total Downloads
      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 27 Feb 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media