15 research outputs found
Effects of Waveform PMF on Anti-Spoofing Detection
International audienceIn the context of detection of speaker recognition identity impersonation , we observed that the waveform probability mass function (PMF) of genuine speech differs from significantly of of PMF from identity theft extracts. This is true for synthesized or converted speech as well as for replayed speech. In this work, we mainly ask whether this observation has a significant impact on spoofing detection performance. In a second step, we want to reduce the distribution gap of waveforms between authentic speech and spoofing speech. We propose a genuiniza-tion of the spoofing speech (by analogy with Gaussianisation), i.e. to obtain spoofing speech with a PMF close to the PMF of genuine speech. Our genuinization is evaluated on ASVspoof 2019 challenge datasets, using the baseline system provided by the challenge organization. In the case of constant Q cep-stral coefficients (CQCC) features, the genuinization leads to a degradation of the baseline system performance by a factor of 10, which shows a potentially large impact of the distribution os waveforms on spoofing detection performance. However, by ''playing" with all configurations, we also observed different behaviors, including performance improvements in specific cases. This leads us to conclude that waveform distribution plays an important role and must be taken into account by anti-spoofing systems
Time-Domain Based Embeddings for Spoofed Audio Representation
Anti-spoofing is the task of speech authentication. That is, identifying
genuine human speech compared to spoofed speech. The main focus of this paper
is to suggest new representations for genuine and spoofed speech, based on the
probability mass function (PMF) estimation of the audio waveforms' amplitude.
We introduce a new feature extraction method for speech audio signals: unlike
traditional methods, our method is based on direct processing of time-domain
audio samples. The PMF is utilized by designing a feature extractor based on
different PMF distances and similarity measures. As an additional step, we used
filter-bank preprocessing, which significantly affects the discriminative
characteristics of the features and facilitates convenient visualization of
possible clustering of spoofing attacks. Furthermore, we use diffusion maps to
reveal the underlying manifold on which the data lies.
The suggested embeddings allow the use of simple linear separators to achieve
decent performance. In addition, we present a convenient way to visualize the
data, which helps to assess the efficiency of different spoofing techniques.
The experimental results show the potential of using multi-channel PMF based
features for the anti-spoofing task, in addition to the benefits of using
diffusion maps both as an analysis tool and as an embedding tool
How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Shortcut learning, or `Clever Hans effect` refers to situations where a
learning agent (e.g., deep neural networks) learns spurious correlations
present in data, resulting in biased models. We focus on finding shortcuts in
deep learning based spoofing countermeasures (CMs) that predict whether a given
utterance is spoofed or not. While prior work has addressed specific data
artifacts, such as silence, no general normative framework has been explored
for analyzing shortcut learning in CMs. In this study, we propose a generic
approach to identifying shortcuts by introducing systematic interventions on
the training and test sides, including the boundary cases of `near-perfect` and
`worse than coin flip` (label flip). By using three different models, ranging
from classic to state-of-the-art, we demonstrate the presence of shortcut
learning in five simulated conditions. We analyze the results using a
regression model to understand how biases affect the class-conditional score
statistics.Comment: Interspeech 202
Capturing scattered discriminative information using a deep architecture in acoustic scene classification
Frequently misclassified pairs of classes that share many common acoustic
properties exist in acoustic scene classification (ASC). To distinguish such
pairs of classes, trivial details scattered throughout the data could be vital
clues. However, these details are less noticeable and are easily removed using
conventional non-linear activations (e.g. ReLU). Furthermore, making design
choices to emphasize trivial details can easily lead to overfitting if the
system is not sufficiently generalized. In this study, based on the analysis of
the ASC task's characteristics, we investigate various methods to capture
discriminative information and simultaneously mitigate the overfitting problem.
We adopt a max feature map method to replace conventional non-linear
activations in a deep neural network, and therefore, we apply an element-wise
comparison between different filters of a convolution layer's output. Two data
augment methods and two deep architecture modules are further explored to
reduce overfitting and sustain the system's discriminative power. Various
experiments are conducted using the detection and classification of acoustic
scenes and events 2020 task1-a dataset to validate the proposed methods. Our
results show that the proposed system consistently outperforms the baseline,
where the single best performing system has an accuracy of 70.4% compared to
65.1% of the baseline.Comment: Submitted to DCASE2020 worksho
Radio Frequency Based Programmable Logic Controller Anomaly Detection
The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components
Authentication and Integrity Protection at Data and Physical layer for Critical Infrastructures
This thesis examines the authentication and the data integrity services in two prominent emerging contexts such as Global Navigation Satellite Systems (GNSS) and the Internet of Things (IoT), analyzing various techniques proposed in the literature and proposing novel methods.
GNSS, among which Global Positioning System (GPS) is the most widely used, provide affordable access to accurate positioning and timing with global coverage. There are several motivations to attack GNSS: from personal privacy reasons, to disrupting critical infrastructures for terrorist purposes.
The generation and transmission of spoofing signals either for research purpose or for actually mounting attacks has become easier in recent years with the increase of the computational power and with the availability on the market of Software Defined Radios (SDRs), general purpose radio devices that can be programmed to both receive and transmit RF signals.
In this thesis a security analysis of the main currently proposed data and signal level authentication mechanisms for GNSS is performed. A novel GNSS data level authentication scheme, SigAm, that combines the security of asymmetric cryptographic primitives with the performance of hash functions or symmetric key cryptographic primitives is proposed. Moreover, a generalization of GNSS signal layer security code estimation attacks and defenses is provided, improving their performance, and an autonomous anti-spoofing technique that exploits semi-codeless tracking techniques is introduced.
Finally, physical layer authentication techniques for IoT are discussed, providing a trade-off between the performance of the authentication protocol and energy expenditure of the authentication process
PLC Hardware Discrimination using RF-DNA fingerprinting
Programmable Logic Controllers are used to control and monitor automated process in many Supervisory Control and Data Acquisition (SCADA) critical applications. As with virtually all electronic devices, PLCs contain Integrated Circuits (IC) that are often manufactured overseas. ICs that have been unknowingly altered (counterfeited, manufactured with hardware Trojans, etc.) pose a significant security vulnerability. To mitigate this risk, the RF-Distinct Native Attribute (RF-DNA) fingerprinting process is applied to PLC hardware devices to augment bit-level security. RF-DNA fingerprints are generated using two independent signal collection platforms. Two different classifiers are applied for device classification. A verification process is implemented for analysis of Authorized Device Identification and Rogue Device Rejection. Fingerprint feature dimensional reduction is evaluated both Qualitatively and Quantitatively to enhance experimental-to-operational transition potential. The findings of this research are that the higher quality signal collection platform had a classification performance gain of approximately 10dB SNR. Performance of the classifiers varied between signal collection platforms, and also with the application of fingerprint dimensional reduction. The lower quality signal collection platform saw a maximum gain of 5dB SNR using reduced dimensional feature sets compared against the full dimensional feature set
Array processing techniques for direction of arrival estimation, communications, and localization in vehicular and wireless sensor networks
Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018.Técnicas de processamentos de sinais para comunicações sem fio tem sido um tópico de interesse para pesquisas há mais de três décadas. De acordo com o padrão Release 9 desenvolvido pelo consorcio 3rd Generation Partnership Project (3GPP) sistemas utilizando múltiplas antenas foram adotados na quarta geração (4G) dos sistemas de comunicação sem fio, também conhecida em inglês como Long Term Evolution (LTE). Para a quinta geração (5G) dos sistemas de comunicação sem fio centenas de antenas devem ser incorporadas aos equipamentos, na arquitetura conhecida em inglês como massive multi-user Multiple Input Multiple Output (MIMO). A presença de múltiplas antenas provê benefícios como o ganho do arranjo, ganho de diversidade, ganho espacial e redução de interferência. Além disso, arranjos de antenas possibilitam a filtragem espacial e a estimação de parâmetros, ambos podem ser usados para se resolver problemas que antes não eram vistos pelo prisma de processamento de sinais. O objetivo dessa tese é superar a lacuna entre a teoria de processamento de sinais e as aplicações da mesma em problemas reais. Tradicionalmente, técnicas de processamento de sinais assumem a existência de um arranjo de antenas ideal. Portanto, para que tais técnicas sejam exploradas em aplicações reais, um conjunto robusto de métodos para interpolação do arranjo é fundamental. Estes métodos são desenvolvidos nesta tese. Além disso problemas no campo de redes de sensores e redes veiculares são tratados nesta tese utilizando-se uma perspectiva de processamento de sinais. Nessa tesa métodos inovadores de interpolação de arranjos são apresentados e sua performance é testada utilizando-se cenários reais. Conceitos de processamento de sinais são implementados no contexto de redes de sensores. Esses conceitos possibilitam um nível de sincronização suficiente para a aplicação de sistemas de múltiplas antenas distribuídos, o que resulta em uma rede com maior vida útil e melhor performance. Métodos de processamento de sinais em arranjos são propostos para resolver o problema de localização baseada em sinais de rádio em redes veiculares, com aplicações em segurança de estradas e proteção de pedestres. Esta tese foi escrita em língua inglesa, um sumário em língua portuguesa é apresentado ao final da mesma.Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES).Array signal processing in wireless communication has been a topic of interest in research for over three decades. In the fourth generation (4G) of the wireless communication systems, also known as Long Term Evolution (LTE), multi antenna systems have been adopted according to the Release 9 of the 3rd Generation Partnership Project (3GPP). For the fifth generation (5G) of the wireless communication systems, hundreds of antennas should be incorporated to the devices in a massive multi-user Multiple Input Multiple Output (MIMO) architecture. The presence of multiple antennas provides array gain, diversity gain, spatial gain, and interference reduction. Furthermore, arrays enable spatial filtering and parameter estimation, which can be used to help solve problems that could not previously be addressed from a signal processing perspective. The aim of this thesis is to bridge some gaps between signal processing theory and real world applications. Array processing techniques traditionally assume an ideal array. Therefore, in order to exploit such techniques, a robust set of methods for array interpolation are fundamental and are developed in this work. Problems in the field of wireless sensor networks and vehicular networks are also addressed from an array signal processing perspective. In this dissertation, novel methods for array interpolation are presented and their performance in real world scenarios is evaluated. Signal processing concepts are implemented in the context of a wireless sensor network. These concepts provide a level of synchronization sufficient for distributed multi antenna communication to be applied, resulting in improved lifetime and improved overall network behaviour. Array signal processing methods are proposed to solve the problem of radio based localization in vehicular network scenarios with applications in road safety and pedestrian protection