RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Compression history detection for MP3 audio

        ( Diqun Yan ),( Rangding Wang ),( Jinglei Zhou ),( Chao Jin ),( Zhifeng Wang ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.2

        Compression history detection plays an important role in digital multimedia forensics. Most existing works, however, mainly focus on digital image and video. Additionally, the existed audio compression detection algorithms aim to detect the trace of double compression. In real forgery scenario, multiple compression is more likely to happen. In this paper, we proposed a detection algorithm to reveal the compression history for MP3 audio. The statistics of the scale factor and Huffman table index which are the parameters of MP3 codec have been extracted as the detecting features. The experimental results have shown that the proposed method can effectively identify whether the testing audio has been previously treated with single/double/triple compression.

      • KCI등재

        Defending and Detecting Audio Adversarial Example using Frame Offsets

        ( Yongkang Gong ),( Diqun Yan ),( Terui Mao ),( Donghua Wang ),( Rangding Wang ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.4

        Machine learning models are vulnerable to adversarial examples generated by adding a deliberately designed perturbation to a benign sample. Particularly, for automatic speech recognition (ASR) system, a benign audio which sounds normal could be decoded as a harmful command due to potential adversarial attacks. In this paper, we focus on the countermeasures against audio adversarial examples. By analyzing the characteristics of ASR systems, we find that frame offsets with silence clip appended at the beginning of an audio can degenerate adversarial perturbations to normal noise. For various scenarios, we exploit frame offsets by different strategies such as defending, detecting and hybrid strategy. Compared with the previous methods, our proposed method can defense audio adversarial example in a simpler, more generic and efficient way. Evaluated on three state-of-the-arts adversarial attacks against different ASR systems respectively, the experimental results demonstrate that the proposed method can effectively improve the robustness of ASR systems.

      • KCI등재

        A Robust Method for Speech Replay Attack Detection

        ( Lang Lin ),( Rangding Wang ),( Diqun Yan ),( Li Dong ) 한국인터넷정보학회 2020 KSII Transactions on Internet and Information Syst Vol.14 No.1

        Spoofing attacks, especially replay attacks, pose great security challenges to automatic speaker verification (ASV) systems. Current works on replay attacks detection primarily focused on either developing new features or improving classifier performance, ignoring the effects of feature variability, e.g., the channel variability. In this paper, we first establish a mathematical model for replay speech and introduce a method for eliminating the negative interference of the channel. Then a novel feature is proposed to detect the replay attacks. To further boost the detection performance, four post-processing methods using normalization techniques are investigated. We evaluate our proposed method on the ASVspoof 2017 dataset. The experimental results show that our approach outperforms the competing methods in terms of detection accuracy. More interestingly, we find that the proposed normalization strategy could also improve the performance of the existing algorithms.

      • Cryptanalysis of a Multiple Server Smart Card based Authentication Scheme

        Yanan Chen,Rangding Wang,Diqun Yan,Chao Jin 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.12

        The design of the remote user authentication scheme for access to the service server is a very important issue in a multi-server environment. In particular, it is essential for mutual authentication and key agreement process between the user and the server. Proposed so far many schemes are focused to increase safety, reduce the communication time and calculation cost. On the other hand, there is a limit to overcome a variety of attacks. In recent years, Jain et al'.s proposed the authentication scheme, such as mutual authentication and session key establishment, smart card-based multi-server authentication scheme to withstand a variety of attacks. In this paper, I analyze that Jain et al'.s scheme is not secure against user impersonation attack, man-in-the-middle attack, DoS attack, reply attack etc.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼