15 research outputs found

    Effects of Waveform PMF on Anti-Spoofing Detection

    Get PDF
    International audienceIn the context of detection of speaker recognition identity impersonation , we observed that the waveform probability mass function (PMF) of genuine speech differs from significantly of of PMF from identity theft extracts. This is true for synthesized or converted speech as well as for replayed speech. In this work, we mainly ask whether this observation has a significant impact on spoofing detection performance. In a second step, we want to reduce the distribution gap of waveforms between authentic speech and spoofing speech. We propose a genuiniza-tion of the spoofing speech (by analogy with Gaussianisation), i.e. to obtain spoofing speech with a PMF close to the PMF of genuine speech. Our genuinization is evaluated on ASVspoof 2019 challenge datasets, using the baseline system provided by the challenge organization. In the case of constant Q cep-stral coefficients (CQCC) features, the genuinization leads to a degradation of the baseline system performance by a factor of 10, which shows a potentially large impact of the distribution os waveforms on spoofing detection performance. However, by ''playing" with all configurations, we also observed different behaviors, including performance improvements in specific cases. This leads us to conclude that waveform distribution plays an important role and must be taken into account by anti-spoofing systems

    Time-Domain Based Embeddings for Spoofed Audio Representation

    Full text link
    Anti-spoofing is the task of speech authentication. That is, identifying genuine human speech compared to spoofed speech. The main focus of this paper is to suggest new representations for genuine and spoofed speech, based on the probability mass function (PMF) estimation of the audio waveforms' amplitude. We introduce a new feature extraction method for speech audio signals: unlike traditional methods, our method is based on direct processing of time-domain audio samples. The PMF is utilized by designing a feature extractor based on different PMF distances and similarity measures. As an additional step, we used filter-bank preprocessing, which significantly affects the discriminative characteristics of the features and facilitates convenient visualization of possible clustering of spoofing attacks. Furthermore, we use diffusion maps to reveal the underlying manifold on which the data lies. The suggested embeddings allow the use of simple linear separators to achieve decent performance. In addition, we present a convenient way to visualize the data, which helps to assess the efficiency of different spoofing techniques. The experimental results show the potential of using multi-channel PMF based features for the anti-spoofing task, in addition to the benefits of using diffusion maps both as an analysis tool and as an embedding tool

    How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning

    Full text link
    Shortcut learning, or `Clever Hans effect` refers to situations where a learning agent (e.g., deep neural networks) learns spurious correlations present in data, resulting in biased models. We focus on finding shortcuts in deep learning based spoofing countermeasures (CMs) that predict whether a given utterance is spoofed or not. While prior work has addressed specific data artifacts, such as silence, no general normative framework has been explored for analyzing shortcut learning in CMs. In this study, we propose a generic approach to identifying shortcuts by introducing systematic interventions on the training and test sides, including the boundary cases of `near-perfect` and `worse than coin flip` (label flip). By using three different models, ranging from classic to state-of-the-art, we demonstrate the presence of shortcut learning in five simulated conditions. We analyze the results using a regression model to understand how biases affect the class-conditional score statistics.Comment: Interspeech 202

    Capturing scattered discriminative information using a deep architecture in acoustic scene classification

    Full text link
    Frequently misclassified pairs of classes that share many common acoustic properties exist in acoustic scene classification (ASC). To distinguish such pairs of classes, trivial details scattered throughout the data could be vital clues. However, these details are less noticeable and are easily removed using conventional non-linear activations (e.g. ReLU). Furthermore, making design choices to emphasize trivial details can easily lead to overfitting if the system is not sufficiently generalized. In this study, based on the analysis of the ASC task's characteristics, we investigate various methods to capture discriminative information and simultaneously mitigate the overfitting problem. We adopt a max feature map method to replace conventional non-linear activations in a deep neural network, and therefore, we apply an element-wise comparison between different filters of a convolution layer's output. Two data augment methods and two deep architecture modules are further explored to reduce overfitting and sustain the system's discriminative power. Various experiments are conducted using the detection and classification of acoustic scenes and events 2020 task1-a dataset to validate the proposed methods. Our results show that the proposed system consistently outperforms the baseline, where the single best performing system has an accuracy of 70.4% compared to 65.1% of the baseline.Comment: Submitted to DCASE2020 worksho

    Radio Frequency Based Programmable Logic Controller Anomaly Detection

    Get PDF
    The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components

    Authentication and Integrity Protection at Data and Physical layer for Critical Infrastructures

    Get PDF
    This thesis examines the authentication and the data integrity services in two prominent emerging contexts such as Global Navigation Satellite Systems (GNSS) and the Internet of Things (IoT), analyzing various techniques proposed in the literature and proposing novel methods. GNSS, among which Global Positioning System (GPS) is the most widely used, provide affordable access to accurate positioning and timing with global coverage. There are several motivations to attack GNSS: from personal privacy reasons, to disrupting critical infrastructures for terrorist purposes. The generation and transmission of spoofing signals either for research purpose or for actually mounting attacks has become easier in recent years with the increase of the computational power and with the availability on the market of Software Defined Radios (SDRs), general purpose radio devices that can be programmed to both receive and transmit RF signals. In this thesis a security analysis of the main currently proposed data and signal level authentication mechanisms for GNSS is performed. A novel GNSS data level authentication scheme, SigAm, that combines the security of asymmetric cryptographic primitives with the performance of hash functions or symmetric key cryptographic primitives is proposed. Moreover, a generalization of GNSS signal layer security code estimation attacks and defenses is provided, improving their performance, and an autonomous anti-spoofing technique that exploits semi-codeless tracking techniques is introduced. Finally, physical layer authentication techniques for IoT are discussed, providing a trade-off between the performance of the authentication protocol and energy expenditure of the authentication process

    PLC Hardware Discrimination using RF-DNA fingerprinting

    Get PDF
    Programmable Logic Controllers are used to control and monitor automated process in many Supervisory Control and Data Acquisition (SCADA) critical applications. As with virtually all electronic devices, PLCs contain Integrated Circuits (IC) that are often manufactured overseas. ICs that have been unknowingly altered (counterfeited, manufactured with hardware Trojans, etc.) pose a significant security vulnerability. To mitigate this risk, the RF-Distinct Native Attribute (RF-DNA) fingerprinting process is applied to PLC hardware devices to augment bit-level security. RF-DNA fingerprints are generated using two independent signal collection platforms. Two different classifiers are applied for device classification. A verification process is implemented for analysis of Authorized Device Identification and Rogue Device Rejection. Fingerprint feature dimensional reduction is evaluated both Qualitatively and Quantitatively to enhance experimental-to-operational transition potential. The findings of this research are that the higher quality signal collection platform had a classification performance gain of approximately 10dB SNR. Performance of the classifiers varied between signal collection platforms, and also with the application of fingerprint dimensional reduction. The lower quality signal collection platform saw a maximum gain of 5dB SNR using reduced dimensional feature sets compared against the full dimensional feature set

    Array processing techniques for direction of arrival estimation, communications, and localization in vehicular and wireless sensor networks

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018.Técnicas de processamentos de sinais para comunicações sem fio tem sido um tópico de interesse para pesquisas há mais de três décadas. De acordo com o padrão Release 9 desenvolvido pelo consorcio 3rd Generation Partnership Project (3GPP) sistemas utilizando múltiplas antenas foram adotados na quarta geração (4G) dos sistemas de comunicação sem fio, também conhecida em inglês como Long Term Evolution (LTE). Para a quinta geração (5G) dos sistemas de comunicação sem fio centenas de antenas devem ser incorporadas aos equipamentos, na arquitetura conhecida em inglês como massive multi-user Multiple Input Multiple Output (MIMO). A presença de múltiplas antenas provê benefícios como o ganho do arranjo, ganho de diversidade, ganho espacial e redução de interferência. Além disso, arranjos de antenas possibilitam a filtragem espacial e a estimação de parâmetros, ambos podem ser usados para se resolver problemas que antes não eram vistos pelo prisma de processamento de sinais. O objetivo dessa tese é superar a lacuna entre a teoria de processamento de sinais e as aplicações da mesma em problemas reais. Tradicionalmente, técnicas de processamento de sinais assumem a existência de um arranjo de antenas ideal. Portanto, para que tais técnicas sejam exploradas em aplicações reais, um conjunto robusto de métodos para interpolação do arranjo é fundamental. Estes métodos são desenvolvidos nesta tese. Além disso problemas no campo de redes de sensores e redes veiculares são tratados nesta tese utilizando-se uma perspectiva de processamento de sinais. Nessa tesa métodos inovadores de interpolação de arranjos são apresentados e sua performance é testada utilizando-se cenários reais. Conceitos de processamento de sinais são implementados no contexto de redes de sensores. Esses conceitos possibilitam um nível de sincronização suficiente para a aplicação de sistemas de múltiplas antenas distribuídos, o que resulta em uma rede com maior vida útil e melhor performance. Métodos de processamento de sinais em arranjos são propostos para resolver o problema de localização baseada em sinais de rádio em redes veiculares, com aplicações em segurança de estradas e proteção de pedestres. Esta tese foi escrita em língua inglesa, um sumário em língua portuguesa é apresentado ao final da mesma.Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES).Array signal processing in wireless communication has been a topic of interest in research for over three decades. In the fourth generation (4G) of the wireless communication systems, also known as Long Term Evolution (LTE), multi antenna systems have been adopted according to the Release 9 of the 3rd Generation Partnership Project (3GPP). For the fifth generation (5G) of the wireless communication systems, hundreds of antennas should be incorporated to the devices in a massive multi-user Multiple Input Multiple Output (MIMO) architecture. The presence of multiple antennas provides array gain, diversity gain, spatial gain, and interference reduction. Furthermore, arrays enable spatial filtering and parameter estimation, which can be used to help solve problems that could not previously be addressed from a signal processing perspective. The aim of this thesis is to bridge some gaps between signal processing theory and real world applications. Array processing techniques traditionally assume an ideal array. Therefore, in order to exploit such techniques, a robust set of methods for array interpolation are fundamental and are developed in this work. Problems in the field of wireless sensor networks and vehicular networks are also addressed from an array signal processing perspective. In this dissertation, novel methods for array interpolation are presented and their performance in real world scenarios is evaluated. Signal processing concepts are implemented in the context of a wireless sensor network. These concepts provide a level of synchronization sufficient for distributed multi antenna communication to be applied, resulting in improved lifetime and improved overall network behaviour. Array signal processing methods are proposed to solve the problem of radio based localization in vehicular network scenarios with applications in road safety and pedestrian protection
    corecore