CSI2Dig: Recovering Digit Content from Smartphone Loudspeakers Using Channel State Information
- URL: http://arxiv.org/abs/2504.14812v1
- Date: Mon, 21 Apr 2025 02:31:19 GMT
- Title: CSI2Dig: Recovering Digit Content from Smartphone Loudspeakers Using Channel State Information
- Authors: Yangyang Gu, Xianglong Li, Haolin Wu, Jing Chen, Kun He, Ruiying Du, Cong Wu,
- Abstract summary: We propose a scheme, CSI2Dig, for recovering digit content from Channel State Information (CSI) when digits are played through a smartphone loudspeaker.<n>We observe that the electromagnetic interference caused by the audio signals from the loudspeaker affects the WiFi signals emitted by the phone's WiFi antenna.<n>For feature extraction, we introduce the TS-Net, a model that captures relevant features from both the temporal and spatial dimensions of the CSI data.
- Score: 10.86045604075024
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Eavesdropping on sounds emitted by mobile device loudspeakers can capture sensitive digital information, such as SMS verification codes, credit card numbers, and withdrawal passwords, which poses significant security risks. Existing schemes either require expensive specialized equipment, rely on spyware, or are limited to close-range signal acquisition. In this paper, we propose a scheme, CSI2Dig, for recovering digit content from Channel State Information (CSI) when digits are played through a smartphone loudspeaker. We observe that the electromagnetic interference caused by the audio signals from the loudspeaker affects the WiFi signals emitted by the phone's WiFi antenna. Building upon contrastive learning and denoising autoencoders, we develop a two-branch autoencoder network designed to amplify the impact of this electromagnetic interference on CSI. For feature extraction, we introduce the TS-Net, a model that captures relevant features from both the temporal and spatial dimensions of the CSI data. We evaluate our scheme across various devices, distances, volumes, and other settings. Experimental results demonstrate that our scheme can achieve an accuracy of 72.97%.
Related papers
- Audios Don't Lie: Multi-Frequency Channel Attention Mechanism for Audio Deepfake Detection [0.0]
This study proposes an audio deepfake detection method based on multi-frequency channel attention mechanism (MFCA) and 2D discrete cosine transform (DCT)<n>By processing the audio signal into a melspectrogram, using MobileNet V2 to extract deep features, this method can effectively capture the fine-grained frequency domain features in the audio signal.<n> Experimental results show that compared with traditional methods, the model proposed in this study shows significant advantages in accuracy, precision,recall, F1 score and other indicators.
arXiv Detail & Related papers (2024-12-12T17:15:49Z) - Improving WiFi CSI Fingerprinting with IQ Samples [11.35984799379648]
Identity authentication is crucial for ensuring the information security of wireless communication.
RF fingerprinting techniques provide a prom-ising supplement to cryptography-based authentication approaches.
Recent advances advocate easily obtainable channel state in-formation (CSI) by commercial WiFi devices for lightweight RF fingerprinting.
We propose CSI2Q, a novel CSI fingerprinting system that achieves comparable performance to IQ-based approaches.
arXiv Detail & Related papers (2024-08-13T12:21:14Z) - Preventing Radio Fingerprinting through Low-Power Jamming [5.074726108522963]
Radio frequency fingerprinting enables a passive receiver to recognize and authenticate a transmitter without the need for cryptographic tools.
We examine the threat posed by radio frequency fingerprinting, which facilitates the unauthorized identification of wireless devices in the field by malicious entities.
We suggest a method to sanitize the transmitted signal of its fingerprint using a low-power jammer, deployed on purpose to improve devices' anonymity on the channel while still guaranteeing the link's quality of service.
arXiv Detail & Related papers (2024-07-11T09:01:46Z) - Erasing Radio Frequency Fingerprints via Active Adversarial Perturbation [19.88283575742985]
We consider a common RF fingerprinting scenario, where machine learning models are trained from pilot signal data for identification.
A novel adversarial attack solution is designed to generate proper perturbations, whereby the pilot signal can hide the hardware feature and misclassify the model.
Extensive experiment results demonstrate that the RF fingerprints can be effectively erased to protect the user privacy.
arXiv Detail & Related papers (2024-06-11T15:16:05Z) - Joint Sensing and Task-Oriented Communications with Image and Wireless
Data Modalities for Dynamic Spectrum Access [49.83882366499547]
This paper introduces a deep learning approach to dynamic spectrum access, leveraging the synergy of multi-modal image and spectrum data for the identification of potential transmitters.
We consider an edge device equipped with a camera that is taking images of potential objects such as vehicles that may harbor transmitters.
We propose a collaborative system wherein the edge device communicates selectively processed information to a trusted receiver acting as a fusion center.
arXiv Detail & Related papers (2023-12-21T15:26:26Z) - Adversarial Agents For Attacking Inaudible Voice Activated Devices [0.0]
The paper applies reinforcement learning to novel Internet of Thing configurations.
Our analysis of inaudible attacks on voice-activated devices confirms the alarming risk factor of 7.6 out of 10.
By 2024, this new attack surface might encompass more digital voice assistants than people on the planet.
arXiv Detail & Related papers (2023-07-23T02:18:30Z) - Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial
Attacks [70.51799606279883]
We introduce test-time adversarial attacks on deep neural networks (DNNs) for semantic communications.
We show that it is possible to change the semantics of the transferred information even when the reconstruction loss remains low.
arXiv Detail & Related papers (2022-12-20T17:13:22Z) - Task-Oriented Communications for NextG: End-to-End Deep Learning and AI
Security Aspects [78.84264189471936]
NextG communication systems are beginning to explore shifting this design paradigm to reliably executing a given task such as in task-oriented communications.
Wireless signal classification is considered as the task for the NextG Radio Access Network (RAN), where edge devices collect wireless signals for spectrum awareness and communicate with the NextG base station (gNodeB) that needs to identify the signal label.
Task-oriented communications is considered by jointly training the transmitter, receiver and classifier functionalities as an encoder-decoder pair for the edge device and the gNodeB.
arXiv Detail & Related papers (2022-12-19T17:54:36Z) - DeepCSI: Rethinking Wi-Fi Radio Fingerprinting Through MU-MIMO CSI
Feedback Deep Learning [15.160442408342407]
DeepCSI is a novel approach to Wi-Fi radio fingerprinting that authenticates MU-MIMO Wi-Fi devices on the move.
We extensively evaluate the performance of DeepCSI through a massive data collection campaign performed in the wild with off-the-shelf equipment.
Experimental results indicate that DeepCSI correctly identifies the transmitter with an accuracy of up to 98%.
arXiv Detail & Related papers (2022-04-15T18:59:29Z) - A Study of Designing Compact Audio-Visual Wake Word Spotting System
Based on Iterative Fine-Tuning in Neural Network Pruning [57.28467469709369]
We investigate on designing a compact audio-visual wake word spotting (WWS) system by utilizing visual information.
We introduce a neural network pruning strategy via the lottery ticket hypothesis in an iterative fine-tuning manner (LTH-IF)
The proposed audio-visual system achieves significant performance improvements over the single-modality (audio-only or video-only) system under different noisy conditions.
arXiv Detail & Related papers (2022-02-17T08:26:25Z) - Speech Enhancement for Wake-Up-Word detection in Voice Assistants [60.103753056973815]
Keywords spotting and in particular Wake-Up-Word (WUW) detection is a very important task for voice assistants.
This paper proposes a Speech Enhancement model adapted to the task of WUW detection.
It aims at increasing the recognition rate and reducing the false alarms in the presence of these types of noises.
arXiv Detail & Related papers (2021-01-29T18:44:05Z) - Blind Federated Edge Learning [93.29571175702735]
We study federated edge learning (FEEL), where wireless edge devices, each with its own dataset, learn a global model.
We propose an analog over-the-air' aggregation scheme, in which the devices transmit their local updates in an uncoded fashion.
arXiv Detail & Related papers (2020-10-19T16:22:28Z) - DeepSIC: Deep Soft Interference Cancellation for Multiuser MIMO
Detection [98.43451011898212]
In multiuser multiple-input multiple-output (MIMO) setups, where multiple symbols are simultaneously transmitted, accurate symbol detection is challenging.
We propose a data-driven implementation of the iterative soft interference cancellation (SIC) algorithm which we refer to as DeepSIC.
DeepSIC learns to carry out joint detection from a limited set of training samples without requiring the channel to be linear.
arXiv Detail & Related papers (2020-02-08T18:31:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.