ABSTRACT
The widespread adoption and ubiquity of smart devices equipped with microphones (e.g., cellphones, smartwatches, etc.) unfortunately create many significant privacy risks. In recent years, there have been several cases of people's conversations being secretly recorded, sometimes initiated by the device itself. Although some manufacturers are trying to protect users' privacy, to the best of our knowledge, there is not any effective technical solution available. In this work, we present Patronus, a system that can both prevent unauthorized devices from making secret recordings while allowing authorized devices to record conversations. Patronus prevents unauthorized speech recording by emitting what we call a scramble, a low-frequency noise generated by inaudible ultrasonic waves. The scramble prevents unauthorized recordings by leveraging the nonlinear effects of commercial off-the-shelf microphones. The frequency components of the scramble are randomly determined and connected with linear chirps, and the frequency period is fine-tuned so that the scramble pattern is hard to attack. Patronus allows authorized speech recording by secretly delivering the scramble pattern to authorized devices, which can use an adaptive filter to cancel out the scramble. We implement a prototype system and conduct comprehensive experiments. Our results show that only 19.7% of words protected by Patronus' scramble can be recognized by unauthorized devices. Furthermore, authorized recordings have 1.6x higher perceptual evaluation of speech quality (PESQ) score and, on average, 50% lower speech recognition error rates than unauthorized recordings.
- The Guardian. Apple apologises for allowing workers to listen to siri recordings. https://www.theguardian.com/technology/2019/aug/29/apple-apologises-listen-siri-recordings. (Accessed on Feb. 28, 2020).Google Scholar
- CNBC. Amazon echo recorded conversation, sent to random person: report. https://www.cnbc.com/2018/05/24/amazon-echo-recorded-conversation-sent-to-random-person-report.html. (Accessed on Feb. 28, 2020).Google Scholar
- The Guardian. Ukraine prime minister offers resignation after leaked recording. https://www.theguardian.com/world/2020/jan/17/ukraine-prime-minister-oleksiy-goncharuk-offers-resignation-after-leaked-recording. (Accessed on Feb. 28, 2020).Google Scholar
- Yu-Chih Tung and Kang G. Shin. Exploiting sound masking for audio privacy in smartphones. In Proceedings of ACMA SIACCS, July 7--12, 2019, Auckland, New Zealand.Google Scholar
Digital Library
- Qiongzheng Lin, Zhenlin An, and Lei Yang. Rebooting ultrasonic positioning systems for ultrasound-incapable smart devices. In Proceedings of ACM MobiCom, October 21--25, 2019, Los Cabos, Mexico.Google Scholar
Digital Library
- Anti-eavesdropping and recording blocker device, China Patent 201320228440, Oct. 2013.Google Scholar
- Nirupam Roy, Haitham Hassanieh, and Romit Roy Choudhury. Backdoor: Making microphones hear inaudible sounds. In Proceedings of ACM MobiSys, June 19--23, 2017, Niagara Falls, NY, USA.Google Scholar
- Nirupam Roy, Sheng Shen, Haitham Hassanieh, and Romit Roy Choudhury. Inaudible voice commands: The long-range attack and defense. In Proceedings of USENIX NSDI, April 9--11, 2018, Renton, WA, USA.Google Scholar
- Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu. Dolphinattack: Inaudible voice commands. In Proceedings of ACM CCS, October 30-November 3, 2017, Dallas, TX, USA.Google Scholar
- Tao Chen, Longfei Shangguan, Zhenjiang Li, and Kyle Jamieson. Metamorph: Injecting inaudible commands into over-the-air voice controlled systems. In Proceedings of NDSS, February 23--26, 2020, San Diego, CA, USA.Google Scholar
Cross Ref
- Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, and Wenyuan Xu. Nauth: Secure face-to-face device authentication via nonlinearity. In Proceedings of IEEE INFOCOM, April 29-May 2, 2019, Paris, France.Google Scholar
Digital Library
- Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, and Ning Zhang. Surfingattack: Interactive hidden attack on voice assistants using ultrasonic guided wave. In Proceedings of NDSS, February 23--26, 2020, San Diego, CA, USA.Google Scholar
Cross Ref
- Aleksandr Rovner. The principle of ultrasound. https://www.echopedia.org/wiki/The_principle_of_ultrasound, 2015. (Accessed on Oct. 19, 2020).Google Scholar
- Ali H Sayed. Fundamentals of adaptive filtering. John Wiley & Sons, 2003.Google Scholar
- Antony W Rix, John G Beerends, Michael P Hollier, and Andries P Hekstra. Perceptual evaluation of speech quality (pesq)-a new method for speech quality assessment of telephone networks and codecs. In Proceedings of IEEE ICASSP, May 7--11, 2001, Salt Lake City, UT, USA.Google Scholar
Digital Library
- Yitao He, Junyu Bian, Xinyu Tong, Zihui Qian, Wei Zhu, Xiaohua Tian, and Xinbing Wang. Canceling inaudible voice commands against voice control systems. In Proceedings of ACM MobiCom, October 21--25, 2019, Los Cabos, Mexico.Google Scholar
Digital Library
- Anran Wang, Chunyi Peng, Ouyang Zhang, Guobin Shen, and Bing Zeng. Inframe: Multifiexing full-frame visible communication channel for humans and devices. In Proceedings of ACM HotNets, October 27--28, 2014, Los Angeles, CA, USA.Google Scholar
- Anran Wang, Zhuoran Li, Chunyi Peng, Guobin Shen, Gan Fang, and Bing Zeng. Inframe++ achieve simultaneous screen-human viewing and hidden screen-camera communication. In Proceedings of ACM MobiSys, May 18--22, 2015, Florence, Italy.Google Scholar
- Viet Nguyen, Yaqin Tang, Ashwin Ashok, Marco Gruteser, Kristin Dana, Wenjun Hu, Eric Wengrowski, and Narayan Mandayam. High-rate flicker-free screen-camera communication with spatially adaptive embedding. In Proceedings of IEEE INFOCOM, April 10--15, 2016, San Francisco, CA, USA.Google Scholar
Digital Library
- Kai Zhang, Chenshu Wu, Chaofan Yang, Yi Zhao, Kehong Huang, Chunyi Peng, Yunhao Liu, and Zheng Yang. Chromacode: A fully imperceptible screen-camera communication system. In Proceedings of ACM MobiCom, October 29-November 2, 2018, New Delhi, India.Google Scholar
- Qian Wang, Kui Ren, Man Zhou, Tao Lei, Dimitrios Koutsonikolas, and Lu Su. Messages behind the sound: real-time hidden acoustic signal capture with smartphones. In Proceedings of ACM MobiCom, October 3--7, 2016, New York, NY, USA.Google Scholar
Digital Library
- Man Zhou, Qian Wang, Kui Ren, Dimitrios Koutsonikolas, Lu Su, and Yanjiao Chen. Dolphin: Real-time hidden acoustic signal capture with smartphones. IEEE Transactions on Mobile Computing, 18(3):560--573, 2018.Google Scholar
Digital Library
- Lan Zhang, Cheng Bo, Jiahui Hou, Xiang-Yang Li, Yu Wang, Kebin Liu, and Yunhao Liu. Kaleido: You can watch it but cannot record it. In Proceedings of ACM MobiCom, September 7--11, 2015, Paris, France.Google Scholar
- Shilin Zhu, Chi Zhang, and Xinyu Zhang. Automating visual privacy protection using a smart led. In Proceedings of ACM MobiCom, October 16--20, Snowbird, Utah, USA.Google Scholar
- Ingo R Titze and Daniel W Martin. Principles of voice production, 1998.Google Scholar
- Ronald J Baken and Robert F Orlikoff. Clinical measurement of speech and voice. Cengage Learning, 2000.Google Scholar
- Sheng Shen, Nirupam Roy, Junfeng Guan, Haitham Hassanieh, and Romit Roy Choudhury. Mute: bringing iot to noise cancellation. In Proceedings of ACM SIGCOMM, August 20--25, 2018, Budapest, Hungary.Google Scholar
- ITUT Rec. P. 800.1, mean opinion score (mos) terminology. International Telecommunication Union, Geneva, 2006.Google Scholar
- Mika Wilson. Pesq - what is it and how could it transform your customer experience? https://www.spearline.com/blog/post/pesq-what-is-it-and-how-could-it-transform-your-customer-experience-/, 2018. (Accessed on Oct. 2, 2020).Google Scholar
- Kamil Wojcicki. Pesq matlab wrapper. https://www.mathworks.com/matlabcentral/fileexchange/33820-pesq-matlab-wrapper. (Accessed on Mar. 6, 2020).Google Scholar
Index Terms
Patronus: preventing unauthorized speech recordings with support for selective unscrambling
Recommendations
Patronus: Augmented Privacy Protection for Resource Publication in Online Social Networks
SOSE '13: Proceedings of the 2013 IEEE Seventh International Symposium on Service-Oriented System EngineeringOn-line social networks are playing an important role in our daily lives in the modern society. It is becoming much more frequent and convenient for individuals to communicate with others by publishing data such as photos and videos over on-line social ...
Collaborative privacy management: mobile privacy beyond your own devices
SPME '14: Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environmentsAs the development of mobile devices and applications, mobile privacy has become a very important issue. Current researches on mobile privacy mainly focus on potential leakages on a particular device. However, leakage of sensitive data on a mobile ...
Privacy consensus in anonymization systems via game theory
DBSec'12: Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and PrivacyPrivacy protection appears as a fundamental concern when personal data is collected, stored, and published. Several anonymization methods have been proposed to address privacy issues in private datasets. Every anonymization method has at least one ...





Comments