研究生: |
陳俊佑 Chun-Yu Chen |
---|---|
論文名稱: |
基於麥克風干擾與主動噪音消除之聲音記錄及存取系統 Sound Recording and Accessing System based on Microphone Jamming and Active Noise Cancellation |
指導教授: |
羅乃維
Nai-Wei Lo |
口試委員: |
楊傳凱
Chuan-Kai Yang 羅乃維 Nai-Wei Lo 林伯慎 Bor-Shen Lin |
學位類別: |
碩士 Master |
系所名稱: |
管理學院 - 資訊管理系 Department of Information Management |
論文出版年: | 2021 |
畢業學年度: | 109 |
語文別: | 中文 |
論文頁數: | 70 |
中文關鍵詞: | 干擾 、麥克風 、超音波 、存取控制 、主動式噪音消除 、竊聽 、聲學 |
外文關鍵詞: | Jamming, Microphone, Ultrasonic, Access Control, Active Noise Cancellation, Eavesdropping, Acoustics |
相關次數: | 點閱:349 下載:8 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著科技快速發展,智慧型設備的計算能力提升、體積逐漸縮小與輕量化,使得隨手記錄聲音變得越來越容易。然而,在錄音設備更輕便的同時,也使得非授權的錄音變得難以預防。如果非公開談話被非法錄音或擷取,則可能會嚴重侵犯個人隱私。而科技的發展除了便利性外必須兼顧隱私的保障,因此隨著人們對隱私的更加注重,如何防止未經授權的錄音,勢必是需要被重視的議題。綜上所述,如何建立一個保障隱私的對話環境,來避免被未授權的第方三竊聽或錄音,將會是目前技術面臨的挑戰及目標。
最近的研究表明,超音波對於麥克風的非線性響應輸出可用來干擾錄音中的麥克風。當原始錄音與干擾噪音的信噪比達到一定比例時,等同於對麥克風的錄音功能進行阻斷服務攻擊(DoS),其對於錄音結果的影響是毀滅性的。若在秘密對談的場域內部署超音波干擾器,此舉可以解決被未授權第三方竊聽或錄音的問題,但同時也帶來新的副作用,使得場域所有麥克風因此失去功能。例如:欲對秘密會談進行聲音紀錄作為證據保存,亦或想在會談結束後根據錄聲音紀錄建立逐字稿等情境,皆因部署麥克風干擾器所帶來的副作用而無法實現。
因此本研究基於麥克風干擾與主動噪音消除技術,透過超音波對麥克風造成的非線性響應輸出與自適應噪音消除高關聯度噪音等特性,提出一套干擾/還原的方法。同時藉由密碼系統的機密性與不可否認性,發展一套以其為基礎的會談聲音記錄存取協定。透過上述技術的結合,解決部署有麥克風干擾器的場域裡,無法取得有效聲學紀錄的問題。綜上所述,本研究建構了一套聲音記錄及存取系統,在保障會談隱私的同時,也允許特定參與者,得以於私密會談結束後取得還原的有效之聲音記錄。
With the advancement in science and technology, the recording devices have become more compact and efficient in terms of power consumption. This has made it easier than ever to carry such portable recording devices and use them for hours without worrying about battery life. However, as the recording equipment becomes easier to carry, eavesdropping becomes more challenging to prevent. If a private conversation is illegally recorded or captured, personal privacy may be seriously violated. This makes it important to add features to the new technological solutions that give priority to privacy and security. As people become more and more concerned about privacy issues, preventing unauthorized recording is bound to be an issue that needs to be taken seriously. In summary, establishing a privacy-guaranteed environment to avoid being eavesdropped on or unauthorized recorded will be the challenge and goal of modern technology.
Recent works have demonstrated that the non-linear impulse response of ultrasonic can interfere with the microphone while recording. When the signal-to-noise ratio between the original recording and the interference noise reaches a certain level, it is equivalent to a denial of service (DoS) attack on the microphone's recording. The impact of such an attack on the recording result can be devastating. If an ultrasonic jammer is deployed in a chamber where people are having a private conversation. Deploying an ultrasonic jammer in a chamber where a private conversation is taking place not only solves the problem of eavesdropping or unauthorized recording, but also affects all microphones in the same area. For example, if you want to record a secret meeting as evidence, or you want to create a verbatim script based on the recording after the meeting, everything will be affected due to the interference caused by the ultrasonic microphone jammer.
To solve this problem, we propose a jamming/de-jamming method based on microphone jammer and Active Noise Cancellation (ANC) technology. The proposed approach utilizes the non-linear impulse response of ultrasonic to jam the microphone and de-jam the record by cancelling the high-correlation noise. At the same time, we developed a sound record accessing protocol based on the confidentiality and non-repudiation provided by asymmetric cryptography. By combining the above mentioned technologies, we were able to solve the problem of inaccessibility and corruption of acoustic records in case of a private conversation that happened in the area where microphone jammers are deployed. In summary, we engineered a sound recording and accessing system that protects the privacy of conversations and makes it possible to allow authorized participants to access de-jammed records after the private conversation.
[1] L. Song and P. Mittal, “Poster: Inaudible voice commands,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 2583– 2585.
[2] H. Chung, M. Iorga, J. Voas, and S. Lee, “Alexa, can i trust you?” Computer, vol. 50, no. 9, pp. 100–104, 2017.
[3] J. Mao, S. Zhu, X. Dai, Q. Lin, and J. Liu, “Watchdog: Detecting ultrasonic-based inaudible voice attacks to smart home systems,” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8025–8035, 2020.
[4] Y. Chen, H. Li, S. Nagels, Z. Li, P. Lopes, B. Y. Zhao, and H. Zheng, “Understanding the effectiveness of ultrasonic microphone jammer,” arXiv preprint arXiv:1904.08490, 2019.
[5] G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, and W. Xu, “Dolphinattack: Inaudible voice commands,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 103–117.
[6] Y. Chen, H. Li, S.-Y. Teng, S. Nagels, Z. Li, P. Lopes, B. Y. Zhao, and H. Zheng, “Wearable microphone jamming,” in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1–12.
[7] N. Roy, H. Hassanieh, and R. Roy Choudhury, “Backdoor: Making microphones hear inaudible sounds,” in Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, 2017, pp. 2–14.
[8] Y. He, J. Bian, X. Tong, Z. Qian, W. Zhu, X. Tian, and X. Wang, “Canceling inaudible voice commands against voice control systems,” in The 25th Annual International Conference on Mobile Computing and Networking, 2019, pp. 1–15.
[9] L. Li, M. Liu, Y. Yao, F. Dang, Z. Cao, and Y. Liu, “Patronus: preventing unauthorized speech recordings with support for selective unscrambling,” in Proceedings of the 18th Conference on Embedded Networked Sensor Systems, 2020, pp. 245–257.
[10] H. Shen, W. Zhang, H. Fang, Z. Ma, and N. Yu, “Jamsys: Coverage optimization of a microphone jamming system based on ultrasounds,” IEEE Access, vol. 7, pp. 67 483– 67 496, 2019.
[11] Y. Chen, H. Li, S.-Y. Teng, S. Nagels, Z. Li, P. Lopes, H. Zheng, and B. Y. Zhao, “Demonstrating wearable microphone jamming,” in Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020, pp. 1–4.
[12] S.J.ElliottandP.A.Nelson,“Activenoisecontrol,”IEEEsignalprocessingmagazine, vol. 10, no. 4, pp. 12–35, 1993.
[13] B. Widrow and E. Walach, “Adaptive signal processing for adaptive control,” IFAC Proceedings Volumes, vol. 16, no. 9, pp. 7–12, 1983.
[14] A.Singh,“Adaptivenoisecancellation,”Dept.ofElectronics&Communication,Netaji Subhas Institute of Technology, vol. 1, 2001.
[15] B. Widrow, J. R. Glover, J. M. McCool, J. Kaunitz, C. S. Williams, R. H. Hearn, J. R. Zeidler, J. E. Dong, and R. C. Goodlin, “Adaptive noise cancelling: Principles and applications,” Proceedings of the IEEE, vol. 63, no. 12, pp. 1692–1716, 1975.
[16] B. Widrow and S. D. Stearns, Adaptive Signal Processing. USA: Prentice-Hall, Inc., 1985.
[17] R. H. Kwong and E. W. Johnston, “A variable step size lms algorithm,” IEEE Transactions on signal processing, vol. 40, no. 7, pp. 1633–1642, 1992.
[18] R. W. Shirey, “Internet Security Glossary, Version 2,” RFC 4949, Aug. 2007. [Online]. Available: https://rfc-editor.org/rfc/rfc4949.txt
[19] R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE communications magazine, vol. 32, no. 9, pp. 40–48, 1994.
[20] A. Beimel, “Secret-sharing schemes: A survey,” in International conference on coding and cryptology. Springer, 2011, pp. 11–46.
[21] C. S. Chum, B. Fine, G. Rosenberger, and X. Zhang, “A proposed alternative to the shamir secret sharing scheme,” Contemp. Math, vol. 582, pp. 47–50, 2012.
[22] M.NaorandA.Wool,“Accesscontrolandsignaturesviaquorumsecretsharing,”IEEE Transactions on Parallel and Distributed Systems, vol. 9, no. 9, pp. 909–922, 1998.
[23] M. A. Hadavi, R. Jalili, and L. Karimi, “Access control aware data retrieval for secret sharing based database outsourcing,” Distributed and Parallel Databases, vol. 34, no. 4, pp. 505–534, 2016.
[24] N.ZhangandJ.Zhu,“Privacy-preservingaccesscontrolschemeforoutsourceddatain cloud,” in Workshop on E-Business. Springer, 2016, pp. 215–224.
[25] E. Rescorla and T. Dierks, “The Transport Layer Security (TLS) Protocol Version 1.2,” RFC 5246, Aug. 2008. [Online]. Available: https://rfc-editor.org/rfc/rfc5246.txt
[26] E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.3,” RFC 8446, Aug. 2018. [Online]. Available: https://rfc-editor.org/rfc/rfc8446.txt
[27] R. T. Fielding, Architectural styles and the design of network-based software architectures. University of California, Irvine, 2000.
[28] P. J. Leach, R. Salz, and M. H. Mealling, “A Universally Unique IDentifier (UUID) URN Namespace,” RFC 4122, Jul. 2005. [Online]. Available: https: //rfc-editor.org/rfc/rfc4122.txt
[29] M. Dworkin, E. Barker, J. Nechvatal, J. Foti, L. Bassham, E. Roback, and J. Dray, “Advanced encryption standard (aes),” NIST FIPS 197, Nov 2001.
[30] M. Dworkin, “Recommendation for block cipher modes of operation: The ccm mode for authentication and confidentiality [including updates through 7/20/2007],” NIST SP 800-38C, May 2004.
[31] K. Moriarty, B. Kaliski, J. Jonsson, and A. Rusch, “PKCS #1: RSA Cryptography Specifications Version 2.2,” RFC 8017, Nov. 2016. [Online]. Available: https: //rfc-editor.org/rfc/rfc8017.txt
[32] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
[33] D. H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-Hashing for Message Authentication,” RFC 2104, Feb. 1997. [Online]. Available: https: //rfc-editor.org/rfc/rfc2104.txt
[34] M. Cejnek, “Padasip—open source library for adaptive signal processing in language python,” Studentská Tvurcí cinnost, 2017.
[35] L. L. Wong, S. D. Soli, S. Liu, N. Han, and M.-W. Huang, “Development of the mandarin hearing in noise test (mhint),” Ear and hearing, vol. 28, no. 2, pp. 70S–74S, 2007.
[36] A. Hines, J. Skoglund, A. Kokaram, and N. Harte, “Visqol: an objective speech quality model,” EURASIP Journal on Audio, Speech, and Music Processing, vol. 2015 (13), pp. 1–18, 2015.
[37] M.Chinen,F.S.Lim,J.Skoglund,N.Gureev,F.O’Gorman,andA.Hines,“Visqolv3: An open source production ready objective speech and audio metric,” in 2020 Twelfth InternationalConferenceonQualityofMultimediaExperience(QoMEX). IEEE,2020, pp. 1–6.
[38] A. W. Rix, J. G. Beerends, M. P. Hollier, and A. P. Hekstra, “Perceptual evaluation of speech quality (pesq)-a new method for speech quality assessment of telephone networks and codecs,” in 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 01CH37221), vol. 2. IEEE, 2001, pp. 749– 752.
[39] J. G. Beerends, C. Schmidmer, J. Berger, M. Obermann, R. Ullmann, J. Pomy, and M. Keyhl, “Perceptual objective listening quality assessment (polqa), the third generation itu-t standard for end-to-end speech quality measurement part i—temporal alignment,” Journal of the Audio Engineering Society, vol. 61, no. 6, pp. 366–384, 2013.
[40] I. Rec, “P. 800.1, mean opinion score (mos) terminology,” International Telecommunication Union, Geneva, 2006.
[41] N. Roy, S. Shen, H. Hassanieh, and R. R. Choudhury, “Inaudible voice commands: The long-range attack and defense,” in 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), 2018, pp. 547–560.