Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3570361.3592502acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Cancelling Speech Signals for Speech Privacy Protection against Microphone Eavesdropping

Published: 02 October 2023 Publication History

Abstract

Ultrasonic microphone jammers protect speech privacy from being eavesdropped by leveraging microphones' non-linearity. However, existing jammers merely introduce independent noises and are vulnerable to capable adversaries who adopt advanced denoising techniques. We propose a novel jammer, namely MicFrozen. It reduces the signal-to-noise ratio (SNR) at the adversary's microphone from two perspectives, i.e., cancelling speech signals and adding noises that are difficult to be removed. It effectively cancels out the protected speech signals at the adversary without compromising the delivery of the signal to the targeted individual. MicFrozen further adds coherent noises that are coupled with the speech signals to resist removal by the adversary. Extensive evaluations show that MicFrozen can cause a low SNR (-13.6 dB) at the adversary and up to 96.9% of speech signals are unrecognized at the adversary even if state-of-the-art denoising techniques are adopted by the adversary. Comprehensive experiments demonstrate the effectiveness of MicFrozen confronted by capable adversaries.

References

[1]
Muhammad Abuelma'atti. Analysis of the effect of radio frequency interference on the DC performance of bipolar operational amplifiers. IEEE Transactions on Electromagnetic Compatibility, 45:453--458, 2003.
[2]
Luis Almeida. Linear and nonlinear ICA based on mutual information. In IEEE Adaptive Systems for Signal Processing, Communications, and Control Symposium, 2000.
[3]
Russakovskii Artem. Google is permanently nerfing all home minis because mine spied on everything i said 24/7. https://www.androidpolice.com/2017/10/10/google-nerfing-home-minis-mine-spied-everything-said-247/#1, 2021.
[4]
Avisoft Bioacoustics. Condenser Ultrasound Microphone. http://www.avisoft.com/ultrasound-microphones/cm16-cmpa/, 2021.
[5]
Avisoft Bioacoustics. Condenser ultrasound microphone. https://www.avisoft.com/ultrasound-microphones/cm24-cmpa/, 2022.
[6]
Avisoft Bioacoustics. UltraSoundGate 116Hme. https://www.avisoft.com/ultrasoundgate/116hme/#71165, 2022.
[7]
Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, and Kaili Ren. Learning-based practical smartphone eavesdropping with built-in accelerometer. In Network and Distributed System Security Symposium, 2020.
[8]
Yang Bai, Nakul Garg, and Nirupam Roy. SPiDR: Ultra-low-power acoustic spatial sensing for micro-robot navigation. In International Conference on Mobile Systems, Applications and Services, 2022.
[9]
Sören Becker, Marcel Ackermann, Sebastian Lapuschkin, Klaus-Robert Müller, and Wojciech Samek. Interpreting and explaining deep neural networks for classification of audio signals. ArXiv preprint:1807.03418, 2018.
[10]
Sreeram Chakravarthy and Sen Kuo. Application of active noise control for reducing snore. In IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2006.
[11]
Chengyuan Chang, Shingtai Pan, and Kuochun Liao. Active noise control and its application to snore noise cancellation. Asian Journal of Control, 15(6):1648--1654, 2013.
[12]
Yike Chen, Ming Gao, Yimin Li, Lingfeng Zhang, Li Lu, Feng Lin, Jinsong Han, and Kui Ren. Big brother is listening: An evaluation framework on ultrasonic microphone jammers. In IEEE International Conference on Computer Communications, 2022.
[13]
Yuxin Chen. Wearable microphone jamming. https://github.com/y-x-c/wearable-microphone-jamming/, 2020.
[14]
Yuxin Chen, Huiying Li, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. Understanding the effectiveness of ultrasonic microphone jammer. CoRR, abs/1904.08490, 2019.
[15]
Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. Wearable microphone jamming. In International Conference on Human Factors in Computing Systems, 2020.
[16]
J-L Danger, Sylvain Guilley, and Philippe Hoogvorst. High speed true random number generator based on open loop structures in fpgas. Microelectronics journal, 40(11):1650--1656, 2009.
[17]
Detective Store. Speech jammer tower-a for blocking professional microphones and counter-surveillance. https://www.detective-store.com/speech-jammer-tower-a-for-blocking-proffessional-microphones-counter-surveillance-1516.html, 2021.
[18]
Shumin Dong, Bo Zhao, Ying Wang, and Tong Zou. A method of blind separation for coherent source based on single vector sensor. In International Conference on Computer, Information and Telecommunication Systems, 2017.
[19]
Francis A Duck. Medical and non-medical protection standards for ultrasound and infrasound. Progress in biophysics and molecular biology, 93(1--3):176--191, 2007.
[20]
Richard Durstenfeld. Algorithm 235: random permutation. Communications of the ACM, 7(7):420, 1964.
[21]
Jan Eriksson and Visa Koivunen. Blind identifiability of class of nonlinear instantaneous ICA models. In European Signal Processing Conference, 2002.
[22]
Everfine. Pf9800 digital power meter. http://www.everfine.net/en/productsinfo.php?cid=65&id=320, 2022.
[23]
Aurélien Francillon and Claude Castelluccia. Tinyrng: A cryptographic random number generator for wireless sensors network nodes. In International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007.
[24]
Javier Gago, Josep Balcells, David GonzÁlez, Manuel Lamich, Juan Mon, and Alfonso Santolaria. EMI susceptibility model of signal conditioning circuits based on operational amplifiers. IEEE Transactions on Electromagnetic Compatibility, 49(4):849--859, 2007.
[25]
Woonseng Gan, Jun Yang, and Tomoo Kamakura. A review of parametric acoustic array in air. Applied Acoustics, 73(12):1211--1219, 2012.
[26]
Sharon Gannot, Emmanuel Vincent, Shmulik Markovich Golan, and Alexey Ozerov. A consolidated perspective on multimicrophone speech enhancement and source separation. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 25(4):692--730, 2017.
[27]
Ming Gao, Feng Lin, Weiye Xu, Muertikepu Nuermaimaiti, Jinsong Han, Wenyao Xu, and Kui Ren. Deaf-aid: mobile IoT communication exploiting stealthy speaker-to-gyroscope channel. In International Conference on Mobile Computing and Networking, 2020.
[28]
Global TSCM Group, Inc. Anti-recoding system with battery pack. https://www.globaltscmgroup-usa.com/, 2021.
[29]
Google Cloud. Speech-to-text: Automatic speech recognition. https://cloud.google.com/speech-to-text, 2021.
[30]
Jun Han, Albert Jin Chung, and Patrick Tague. Pitchln: eavesdropping via intelligible speech reconstruction using non-acoustic sensor fusion. In ACM/IEEE International Conference on Information Processing in Sensor Networks, 2017.
[31]
Monson H. Hayes. Statistical Digital Signal Processing and Modeling. Wiley press, 1996.
[32]
Yitao He, Junyu Bian, Xinyu Tong, Zihui Qian, Wei Zhu, Xiaohua Tian, and Xinbing Wang. Canceling inaudible voice commands against voice control systems. In International Conference on Mobile Computing and Networking, 2019.
[33]
Jeanny Herault and Christian Jutten. Space or time adaptive signal processing by neural models. In AIP Netural Networks for Computing, 1987.
[34]
Yoichi Hinamoto and Hideaki Sakai. Analysis of the filtered-X LMS algorithm and a related new algorithm for active control of multitonal noise. IEEE Transaction Speech Audio Processing, 14(1):123--130, 2006.
[35]
Morris W. Hirsch and Stephen Smale. Differential equations, dynamical systems, and linear algebra. Academic Press, 1974.
[36]
Shahram Hosseini and Yannick Deville. Blind separation of parametric nonlinear mixtures of possibly autocorrelated and non-stationary sources. IEEE Transactions on Signal Processing, 62(24):6521--6533, 2014.
[37]
Long Huang and Chen Wang. Notification privacy protection via unobtrusive gripping hand verification using media sounds. In International Conference on Mobile Computing and Networking, 2021.
[38]
Norden E. Huang, Zheng Shen, Steven R. Long, Manli C. Wu, Hsing H. Shih, Quanan Zheng, Nai-Chyuan Yen, Chi Chao Tung, and Henry H. Liu. The empirical mode decomposition and the hilbert spectrum for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society of London, 454(1971):903--995, 1998.
[39]
David Huggins-Daines, Mohit Kumar, Arthur Chan, Alan W. Black, Mosur Ravishankar, and Alexander I. Rudnicky. Pocketsphinx: A free, real-time continuous speech recognition system for hand-held devices. In IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2006.
[40]
iFLYTEK Co., Ltd. iFLYTEK open platform-an artificial intelligence platform focusing on intelligent speech interaction wihch provides solutions for global developers. https://global.xfyun.cn/, 2021.
[41]
Chanyoung Jeong, Dongho Choi, and Changsik Yoo. A fast automatic frequency calibration (AFC) scheme for phase-locked loop (PLL) frequency synthesizer. In IEEE Radio Frequency Integrated Circuits Symposium, 2009.
[42]
Jinci Technologies. Product review. http://www.jinci.cn/en/goods/112.html, 2021.
[43]
JingGlass Inc. Hollow glass. http://www.jingglass.com/news/Hollow-glass.html, 2017.
[44]
Christian Jutten, Massoud Babaie-Zadeh, and Shahram Hosseini. Three easy ways for separating nonlinear mixtures? Signal Processing, 84(2):217--229, 2004.
[45]
Kaustubh Kalgaonkar and Bhiksha Raj. Recognizing talking faces from acoustic Doppler reflections. In IEEE International Conference on Automatic Face & Gesture Recognition, 2008.
[46]
Denis Kune, John Backes, Shane Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. Ghost talk: Mitigating EMI signal injection attacks against analog sensors. In IEEE Symposium on Security and Privacy, 2013.
[47]
Andrew Kwong, Wenyuan Xu, and Kevin Fu. Hard drive of hearing: Disks that eavesdrop with a synthesized microphone. In IEEE Symposium on Security and Privacy, 2019.
[48]
Lingkun Li, Manni Liu, Yuguang Yao, Fan Dang, Zhichao Cao, and Yunhao Liu. Patronus: Preventing unauthorized speech recordings with support for selective unscrambling. In International Conference on Embedded Networked Sensor Systems, 2020.
[49]
Qiongzheng Lin, Zhenlin An, and Lei Yang. Rebooting ultrasonic positioning systems for ultrasound-incapable smart devices. In International Conference on Mobile Computing and Networking, 2019.
[50]
Jian Liu, Yan Wang, Gorkem Kar, Yingying Chen, Jie Yang, and Marco Gruteser. Snooping keystrokes with mm-level audio ranging on a single phone. In International Conference on Mobile Computing and Networking, 2015.
[51]
Shoji Makino, Te-Won Lee, Shoji Makino, and Hiroshi Sawada. Blind speech separation. Dordrecht: Springer Netherlands, 2007.
[52]
Masking Privacy Simple. VoiceArrest Sound Masking Features. https://mpsacoustics.com/sound-masking/, 2021.
[53]
Phillip McKerrow and Kok Kai Yoong. Classifying still faces with ultrasonic sensing. Robotics and Autonomous Systems, 55(9):702--710, 2007.
[54]
Yan Michalevsky, Dan Boneh, and Gabi Nakibly. Gyrophone: Recognizing speech from gyroscope signals. In USENIX Security Symposium, 2014.
[55]
Bogdan Mijovic, Maarten De Vos, Ivan Gligorijevic, Joachim Taelman, and Sabine Van Huffel. Source separation from single-channel recordings by combining empirical-mode decomposition and independent component analysis. IEEE transactions on biomedical engineering, 57(9):2188--2196, 2010.
[56]
Rajalakshmi Nandakumar, Vikram Iyer, Desney Tan, and Shyamnath Gollakota. FingerIO: Using active sonar for fine-grained finger tracking. In CHI Conference on Human Factors in Computing Systems, 2016.
[57]
Francesco Nesta, Piergiorgio Svaizer, and Maurizio Omologo. Convolutive bss of short mixtures by ICA recursively regularized across frequencies. IEEE Transactions on Audio, Speech, and Language Processing, 19(3):624--639, 2011.
[58]
Oeler Industries, Inc. Sound Masking Systems. https://www.oeler.com/sound-masking-systems/, 2020.
[59]
Vassil Panayotov, Guoguo Chen, Daniel Povey, and Sanjeev Khudanpur. Librispeech: An ASR corpus based on public domain audio books. In IEEE International Conference on Acoustics, Speech and Signal Processing, 2015.
[60]
Chunyi Peng, Guobin Shen, Yongguang Zhang, Yanlin Li, and Kun Tan. BeepBeep: A high accuracy acoustic ranging system using COTS mobile devices. In International Conference on Embedded Networked Sensor Systems, 2007.
[61]
Yanmin Qian, Chao Weng, Xuankai Chang, Shuai Wang, and Dong Yu. Past review, current progress, and challenges ahead on the cocktail party problem. Frontiers of Information Technology & Electronic Engineering, 19(1):40--63, 2018.
[62]
Soundarya Ramesh, Rui Xiao, Anindya Maiti, Jong Taek Lee, Harini Ramprasad, Ananda Kumar, Murtuza Jadliwala, and Jun Han. Acoustics to the rescue: Physical key inference attack revisited. In USENIX Security Symposium, 2021.
[63]
Nirupam Roy, Haitham Hassanieh, and Romit Roy Choudhury. Backdoor: Making microphones hear inaudible sounds. In International Conference on Mobile Systems, Applications, and Services, 2017.
[64]
Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. Inaudible voice commands: The long-range attack and defense. In USENIX Symposium on Networked Systems Design and Implementation, 2018.
[65]
Manfred R. Schroeder, Bishnu S. Atal, and Joseph L. Hall. Optimizing digital speech coders by exploiting masking properties of the human ear. The Journal of the Acoustical Society of America, 66:1647--1652, 1979.
[66]
Hao Shen, Weiming Zhang, Han Fang, Zehua Ma, and Nenghai Yu. Jamsys: Coverage optimization of a microphone jamming system based on ultrasounds. IEEE Access, 7:67483--67496, 2019.
[67]
Sheng Shen, Nirupam Roy, Junfeng Guan, Haitham Hassanieh, and Romit Roy Choudhury. MUTE: Bringing IoT to noise cancellation. In Conference of the ACM Special Interest Group on Data Communication, 2018.
[68]
Liwei Song and Prateek Mittal. Poster: Inaudible voice commands. In ACM conference on computer and communications security, 2017.
[69]
Ke Sun, Chen Chen, and Xinyu Zhang. "Alexa, stop spying on me!": Speech privacy protection against voice assistants. In International Conference on Embedded Networked Sensor Systems, 2020.
[70]
Anisse Taleb. A generic framework for blind source separation in structured nonlinear models. IEEE Transactions on Signal Processing, 50(8):1819--1830, 2002.
[71]
The Guardian. Apple apologises for allowing workers to listen to siri recordings. https://www.theguardian.com/technology/2019/aug/29/apple-apologises-listen-siri-recordings, 2019.
[72]
The Guardian. Ukraine prime minister offers resignation after leaked recording. https://www.theguardian.com/world/2020/jan/17/ukraine-prime-minister-oleksiy-goncharuk-offers-resignation-after-leaked-recording, 2020.
[73]
Yu-Chih Tung and Kang G. Shin. EchoTag: Accurate infrastructure-free indoor location tagging with smartphones. In International Conference on Mobile Computing and Networking, 2015.
[74]
U-spy Store. Portable ultrasonic microphone defeater. https://uspystore.com/portable-ultrasonic-microphone-defeater/, 2021.
[75]
U-spy Store. Silent ultrasonic microphone defeater. https://uspystore.com/silent-ultrasonic-microphone-defeater/, 2021.
[76]
Unname. Demos of the prototype of micfrozen on anti-eavesdropping. https://youtu.be/8g2UykkPZ-M, 2022.
[77]
VRT NWS. Google employees are eavesdropping, even in your living room. https://www.vrt.be/vrtnws/en/2019/07/10/google-employees-are-eavesdropping-even-in-flemish-living-rooms/, 2019.
[78]
Junjue Wang, Kaichen Zhao, Xinyu Zhang, and Chunyi Peng. Ubiquitous keyboard for small mobile devices: Harnessing multipath fading for fine-grained keystroke localization. In International Conference on Mobile Systems, Applications, and Services, 2014.
[79]
Kuo Wang and Wei Ren. Convergence analysis of the multi-variable filtered-X LMS algorithm with application to active noise control. IEEE Transaction Signal Processing, 47(4):1166--1169, 1999.
[80]
Xuyu Wang, Runze Huang, and Shiwen Mao. Sonarbeat: Sonar phase for breathing beat monitoring with smartphones. In International Conference on Computer Communication and Networks, 2017.
[81]
Ziqi Wang, Zhe Chen, Akash Deep Singh, Luis Garcia, Jun Luo, and Mani B. Srivastava. Uwhear: through-wall extraction and separation of audio vibrations using wireless signals. In ACM Conference on Embedded Networked Sensor Systems, 2020.
[82]
Stefan Werner, Marcello Campos, and Paulo Diniz. Partial-update NLMS algorithms with data-selective updating. IEEE Transaction on Signal Processing, 52(4):938--949, 2004.
[83]
Wikipedia. Finite impulse response. https://en.wikipedia.org/w/index.php?title=Finite_impulse_response&oldid=1044909269, 2021.
[84]
Zhaohua Wu and Norden E Huang. Ensemble empirical mode decomposition: a noise-assisted data analysis method. Advances in adaptive data analysis, 1(1):1--41, 2009.
[85]
Zhizheng Wu, Nicholas Evans, Tomi Kinnunen, Junichi Yamagishi, Federico Alegre, and Haizhou Li. Spoofing and countermeasures for speaker verification: A survey. Speech Communication, 66:130--153, 2015.
[86]
Chenhan Xu, Zhengxiong Li, Hanbin Zhang, Aditya Singh Rathore, Huining Li, Chen Song, Kun Wang, and Wenyao Xu. WaveEar: Exploring a mmwave-based noise-resistant speech sensing for voice-user interface. In International Conference on Mobile Systems, Applications, and Services, 2019.
[87]
Makoto Yamada, Gordon Wichern, Kazunobu Kondo, Masashi Sugiyama, and Hiroshi Sawada. Noise adaptive optimization of matrix initialization for frequency-domain independent component analysis. Digital Signal Processing, 23(1):1--8, 2013.
[88]
Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, and Ning Zhang. SurfingAttack: Interactive hidden attack on voice assistants using ultrasonic guided waves. In Network and Distributed System Security Symposium, 2020.
[89]
Sangki Yun, Yi-Chao Chen, and Lili Qiu. Turning a mobile device into a mouse in the air. In International Conference on Mobile Systems, Applications, and Services, 2015.
[90]
Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, and Wenyuan Xu. Eararray: Defending against DolphinAttack via acoustic attenuation. In Annual Network and Distributed System Security Symposium, 2021.
[91]
Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Dong-lian Qi, and Wenyuan Xu. UltraComm: High-speed and inaudible acoustic communication. In Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019.
[92]
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. Dolphinattack: Inaudible voice commands. In ACM Conference on Computer and Communications Security, 2017.
[93]
Zengbin Zhang, David Chu, Xiaomeng Chen, and Thomas Moscibroda. SwordFight: Enabling a new class of phone-to-phone action games on commodity phones. In International Conference on Mobile Systems, Applications, and Services, 2012.
[94]
Bing Zhou, Mohammed Elbadry, Ruipeng Gao, and Fan Ye. BatMapper: Acoustic sensing based indoor floor plan construction using smart-phones. In International Conference on Mobile Systems, Applications, and Services, 2017.
[95]
Bing Zhou, Mohammed Elbadry, Ruipeng Gao, and Fan Ye. BatTracker: High precision infrastructure-free mobile device tracking in indoor environments. In ACM Conference on Embedded Network Sensor Systems, 2017.
[96]
Bing Zhou, Jay Lohokare, Ruipeng Gao, and Fan Ye. Echoprint: Two-factor authentication using acoustics and vision on smartphones. In International Conference on Mobile Computing and Networking, 2018.
[97]
Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, and Wenyuan Xu. Nauth: Secure face-to-face device authentication via nonlinearity. In IEEE Conference on Computer Communications, 2019.
[98]
Andreas Ziehe, Motoaki Kawanabe, Stefan Harmeling, and Klaus-Robert Müller. Separation of post-nonlinear mixtures using ace and temporal decorrelation. In International Workshop on Independent Component Analysis and Blind Signal Separation, 2001.
[99]
Andreas Ziehe, Motoaki Kawanabe, Stefan Harmeling, and Klaus-Robert Müller. Blind separation of post-nonlinear mixtures using linearizing transformations and temporal decorrelation. The Journal of Machine Learning Research, 4:1319--1338, 2003.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking
October 2023
1605 pages
ISBN:9781450399906
DOI:10.1145/3570361
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. privacy protection
  2. anti-eavesdropping

Qualifiers

  • Research-article

Funding Sources

Conference

ACM MobiCom '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 423
    Total Downloads
  • Downloads (Last 12 months)423
  • Downloads (Last 6 weeks)47
Reflects downloads up to 23 Sep 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media