• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Secure Voice Processing Systems against Malicious Voice Attacks » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Secure Voice Processing Systems against Malicious Voice Attacks

ISBN-13: 9783031447471 / Angielski / Miękka / 2023

Kun Sun;Shu Wang
Secure Voice Processing Systems against Malicious Voice Attacks Kun Sun, Shu Wang 9783031447471 Springer Nature Switzerland - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Secure Voice Processing Systems against Malicious Voice Attacks

ISBN-13: 9783031447471 / Angielski / Miękka / 2023

Kun Sun;Shu Wang
cena 201,72 zł
(netto: 192,11 VAT:  5%)

Najniższa cena z 30 dni: 173,46 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes.First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones, and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems.
This book is intended for security researchers, computer scientists, and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security, and audio security. Advanced-level students who are studying these topics will benefit from this book as well.

Kategorie:
Informatyka, Bezpieczeństwo
Wydawca:
Springer Nature Switzerland
Seria wydawnicza:
SpringerBriefs in Computer Science
Język:
Angielski
ISBN-13:
9783031447471
Rok wydania:
2023
Waga:
0.21 kg
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

1 Introduction

1.1 Overview

1.2 Background

1.2.1 Audio Signal Processing

1.2.2 Voice Processing Systems

1.2.3 Attacks on Speaker Verification Systems

1.2.4 Attacks on Speech Recognition Systems

1.3 Book Structure

References . .

2 Modulated Audio Replay Attack and Dual-Domain Defense

2.1 Introduction

2.2 Modulated Replay Attacks

2.2.1 Impacts of Replay Components

2.2.2 Attack Overview

2.2.3 Modulation Processor

2.2.4 Inverse Filter Estimation

2.2.5 Spectrum Processing

2.3 Countermeasure: Dual-domain Detection

2.3.1 Defense Overview

2.3.2 Time-domain Defense

2.3.3 Frequency-domain Defense

2.3.4 Security Analysis

 

2.4 Evaluation

 

2.4.1 Experiment Setup

 

2.4.2 Effectiveness of Modulated Replay Attacks

2.4.3 Effectiveness of Dual-Domain Detection

2.4.4 Robustness of Dual-Domain Detection

2.4.5 Overhead of Dual-Domain Detection

2.5 Conclusion

 

Appendix 2.A: Mathematical Proof of Ringing Artifacts in Modulated Replay Audio

 

Appendix 2.B: Parameters in Detection Methods

Appendix 2.C: Inverse Filter Implementation

Appendix 2.D: Classifiers in Time-Domain Defense

References

3 Secure Voice Processing Systems for Driverless Vehicles

3.1 Introduction

3.2 Threat Model and Assumptions

3.3 System Design

3.3.1 System Overview

3.3.2 Detecting Multiple Speakers

3.3.3 Identifying Human Voice

3.3.4 Identifying Driver’s Voice

3.4 Experimental Results

3.4.1 Accuracy on Detecting Multiple Speakers

3.4.2 Accuracy on Detecting Human Voice

3.4.3 Accuracy on Detecting Driver’s Voice

3.4.4 System Robustness

3.4.5 Performance Overhead

3.5 Discussions

3.6 Conclusion

References

4 Acoustic Compensation System against Adversarial Voice Recognition

4.1 Introduction

4.2 Threat Model

4.2.1 Spectrum Reduction Attack

4.2.2 Threat Hypothesis

4.3 System Design

4.3.1 Overview

4.3.2 Spectrum Compensation Module

4.3.3 Noise Addition Module

4.3.4 Adaptation Module

4.4 Evaluations

4.4.1 Experiment Setup

4.4.2 ACE Evaluation

4.4.3 Spectrum Compensation Module Evaluation

4.4.4 Noise Addition Module Evaluation

4.4.5 Adaptation Module Evaluation

4.4.6 Overhead

4.5 Residual Error Analysis

4.5.1 Types of ASR Inference Errors

4.5.2 Error Composition Analysis

4.6 Discussions

4.6.1 Multipath Effect and Audio Quality Improvement

4.6.2 Usability

4.6.3 Countering Attack Variants

4.6.4 Limitations

4.7 Conclusion

 Appendix 4.A: Echo Module

Appendix 4.B: ACE Performance tested with CMU Sphinx

Appendix 4.C: ACE Performance against Attack Variants

References

5 Conclusion and Future Work

5.1 Conclusion

5.2 Future Work

References

Dr. Kun Sun is a professor in the Department of Information Sciences and Technology at George Mason University. He is also the director of Sun Security Laboratory and the associate director of the Center for Secure Information Systems. He received his Ph.D. in Computer Science from North Carolina State University. Before joining GMU, he was an assistant professor in College of William and Mary. He has more than 15 years working experience in both academia and industry; his research work has been funded by government agencies including the NSF, DOD, NSA, DHS, and NIST. His research focuses on systems and network security. He has publishing over 130 conference and journal papers, and two papers won the Best Paper Award. His current research focuses on trustworthy computing environment, software security, moving target defense, network security, smart phone security, cloud security, and AI/ML security.


Shu Wang is a Ph.D. Candidate in the Department of Information Sciences and Technology at George Mason University. His research interests lie primarily in the fields of artificial intelligence (AI) and computer security. In particular, his research focuses on the mitigation of attack surfaces in voice processing systems (biometrics security) and open-source software (software security). His past research projects involve computer vision, natural language processing, and digital signal processing. His research papers appear in IEEE S&P, ACM CCS, RAID, IEEE DSN, IEEE INFOCOM, IEEE ICSME, Computers & Security, etc. Previously, He obtained my bachelor’s degree in Communication Engineering and master’s degree in Signal and Information Processing from Nanjing University of Posts and Telecommunications.

This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems. It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features and acoustic physical attributes.

First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum distortion caused by the replay attacks to bypass the existing spectrum-based defenses. The authors also provide an effective defense method that utilizes both the time-domain artifacts and frequency-domain distortion to detect the modulated replay attacks. Second, the book introduces a secure automatic speech recognition system for driverless car to defeat adversarial voice command attacks launched from car loudspeakers, smartphones and passengers. Third, it provides an acoustic compensation system design to reduce the effects from the spectrum reduction attacks, by the audio spectrum compensation and acoustic propagation principle. Finally, the authors conclude with their research effort on defeating the malicious voice attacks and provide insights into more secure voice processing systems.

This book is intended for security researchers, computer scientists and electrical engineers who are interested in the research areas of biometrics, speech signal processing, IoT security and audio security. Advanced-level students who are studying these topics will benefit from this book as well.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia