Dynamic Ultrasonic Jamming via Time–Frequency Mosaic for Anti-Eavesdropping Systems
Abstract
1. Introduction
- Time–Frequency Joint Interference: A novel joint jamming method that integrates temporal and frequency domain characteristics is proposed for the first time. Unlike typical noise injection techniques, TFM not only adjusts its frequency but also modulates its temporal sequence.
- Adaptive Ultrasonic Encoding Strategy: Based on the state of the speech frame, the jamming strategy is dynamically switched to enhance the robustness of the jamming.
- Energy-Constrained Hardware Co-Design: The amplitude of the jamming signal is dynamically adjusted according to the energy of the speech frame, ensuring effective jamming while reducing power consumption.
2. System Principle and Analysis
2.1. Out-of-Band Signal Conversion in Microphone
2.2. Eavesdropping Models Analysis
3. Time–Frequency Mosaic Interference
- Real-time Speech Hybrid Feature Analysis;
- Dynamic Interference Signal Synthesis;
- Energy-Constrained Synthesis and Robustness Enhancement.
3.1. Real-Time Speech Hybrid Feature Analysis
3.2. Dynamic Interference Signal Synthesis
3.3. Energy-Constrained Synthesis and Robustness Enhancement
4. Evaluation and Discussion
4.1. Experimental Set Up
4.2. Interference Energy Utilization Efficiency Analysis
4.3. Interference Effect Analysis
4.4. Robustness Evaluation of Speech Enhancement
4.5. Testing in Real-World Scenarios
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Gao, M.; Chen, Y.; Li, Y.; Zhang, L.; Liu, J.; Lu, L.; Lin, F.; Han, J.; Ren, K. A Resilience Evaluation Framework on Ultrasonic Microphone Jammers. IEEE Trans. Mob. Comput. 2023, 23, 1914–1929. [Google Scholar] [CrossRef]
- Chen, Y.; Gao, M.; Li, Y.; Zhang, L.; Lu, L.; Lin, F.; Han, J.; Ren, K. Big brother is listening: An evaluation framework on ultrasonic microphone jammers. In Proceedings of the IEEE INFOCOM 2022—IEEE Conference on Computer Communications, Online, 2–5 May 2022; pp. 1119–1128. [Google Scholar]
- Chen, Y.; Gao, M.; Liu, Y.; Liu, J.; Xu, X.; Cheng, L.; Han, J. Implement of a secure selective ultrasonic microphone jammer. CCF Trans. Pervasive Comput. Interact. 2021, 3, 367–377. [Google Scholar] [CrossRef]
- Katz, I.R.; Mack, R.L.; Marks, L.; Rosson, M.B.; Nielsen, J. Human factors in computing systems. In Proceedings of the CHI ’95 Conference Companion: CHI ’95, Mosaic of Creativity, Conference on Human Factors in Computing Systems, Denver, CO, USA, 7–11 May 1995. [Google Scholar]
- Ma, X.; Song, Y.; Wang, Z.; Gao, S.; Xiao, B.; Hu, A. You can hear but you cannot record: Privacy protection by jamming audio recording. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
- Colton, G.D. High-Tech Approaches to Breeching Examination Security. Espionage 101. In Proceedings of the Annual Meeting of the National Council on Measurement in Education, Chicago, IL, USA, 25–27 March 1997. audiotape recordings. [Google Scholar]
- Xu, D.; Yan, X.; Chen, B.; Yu, L. Energy-Constrained Confidentiality Fusion Estimation Against Eavesdroppers. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 624–628. [Google Scholar] [CrossRef]
- Tung, Y.C.; Shin, K.G. Exploiting Sound Masking for Audio Privacy in Smartphones. In Proceedings of the the 2019 ACM Asia Conference, Beijing, China, 16–18 December 2019. [Google Scholar]
- Kune, D.F.; Backes, J.; Clark, S.S.; Kramer, D.; Reynolds, M.; Fu, K.; Kim, Y.; Xu, W. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 19–22 May 2013; pp. 145–159. [Google Scholar]
- Zhang, G.; Yan, C.; Ji, X.; Zhang, T.; Zhang, T.; Xu, W. DolphinAtack: Inaudible Voice Commands. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017. [Google Scholar]
- Chen, Y.; Li, H.; Nagels, S.; Li, Z.; Lopes, P.; Zhao, B.Y.; Zheng, H. Understanding the effectiveness of ultrasonic microphone jammer. arXiv 2019, arXiv:1904.08490. [Google Scholar]
- Abuelma’atti, M.T. Analysis of the effect of radio frequency interference on the DC performance of bipolar operational amplifiers. IEEE Trans. Electromagn. Compat. 2003, 45, 453–458. [Google Scholar] [CrossRef]
- Gago, J.; Balcells, J.; GonzÁlez, D.; Lamich, M.; Mon, J.; Santolaria, A. EMI susceptibility model of signal conditioning circuits based on operational amplifiers. IEEE Trans. Electromagn. Compat. 2007, 49, 849–859. [Google Scholar] [CrossRef]
- Yanjing, W.; Zhuoran, M.; Wenyuan, X. Research of anti-eavesdropping technology based on electromagnetic interference against analog sensors. Electron. Technol. 2016, 45, 47–51. [Google Scholar]
- Roy, N.; Shen, S.; Hassanieh, H.; Choudhury, R.R. Inaudible Voice Commands: The Long-Range Attack and Defense. In Proceedings of the Networked Systems Design and Implementation, Renton, WA, USA, 9–11 April 2018. [Google Scholar]
- Sun, K.; Chen, C.; Zhang, X. “Alexa, stop spying on me!” speech privacy protection against voice assistants. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems, Virtual Event, 16–19 November 2020; pp. 298–311. [Google Scholar]
- Roy, N.; Hassanieh, H.; Roy Choudhury, R. Backdoor: Making microphones hear inaudible sounds. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, Niagara Falls, NY, USA, 19–23 June 2017; pp. 2–14. [Google Scholar]
- Chen, Y.; Li, H.; Teng, S.Y.; Nagels, S.; Li, Z.; Lopes, P.; Zhao, B.Y.; Zheng, H. Wearable Microphone Jamming. In Proceedings of the CHI ’20: 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA, 25–30 April 2020; pp. 1–12. [Google Scholar]
- Shen, H.; Zhang, W.; Fang, H.; Ma, Z.; Yu, N. JamSys: Coverage Optimization of a Microphone Jamming System Based on Ultrasounds. IEEE Access 2019, 7, 67483–67496. [Google Scholar] [CrossRef]
- Gui, H.; Yan, C.; Cheng, Y.; Ji, X.; Xu, W. Black Hole of Sound: Constructing an Anti-eavesdropping Area Using Ultrasound. In Proceedings of the 2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2), Chengdu, China, 28–30 October 2022; pp. 1717–1722. [Google Scholar]
- Brungart, D.S.; Simpson, B.D.; Ericson, M.A.; Scott, K.R. Informational and energetic masking effects in the perception of multiple simultaneous talkers. J. Acoust. Soc. Am. 2001, 110, 2527–2538. [Google Scholar] [CrossRef] [PubMed]
- Huang, P.; Wei, Y.; Cheng, P.; Ba, Z.; Lu, L.; Lin, F.; Zhang, F.; Ren, K. InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise. In NDSS; Zhejiang University: Hangzhou, China, 2023. [Google Scholar]
- Han, Z.; Ma, J.; Xu, C.; Zhang, G. UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits. High-Confid. Comput. 2023, 3, 100129. [Google Scholar] [CrossRef]
- Fang, X.; Zhao, D.; Zhang, L. Unimodular Multi-Input Multi-Output Waveform and Mismatch Filter Design for Saturated Forward Jamming Suppression. Sensors 2024, 24, 5884. [Google Scholar] [CrossRef] [PubMed]
- Yu, L.J.T.; Zhao, R.; Ji, S.; Ngai, E.C.; Wu, C. USpeech: Ultrasound-Enhanced Speech with Minimal Human Effort via Cross-Modal Synthesis. arXiv 2024, arXiv:2410.22076. [Google Scholar] [CrossRef]
- Makhoul, J. Linear prediction: A tutorial review. Proc. IEEE 1975, 63, 561–580. [Google Scholar] [CrossRef]
- Hayes, M.H. Statistical Digital Signal Processing and Modeling; John Wiley & Sons: Hoboken, NJ, USA, 1996. [Google Scholar]
- Fayek, H.M. Speech Processing for Machine Learning: Filter banks, Mel-Frequency Cepstral Coefficients (MFCCs) and What’s In-Between. 2016. Available online: https://haythamfayek.com/2016/04/21/speech-processing-for-machine-learning.html (accessed on 21 April 2016).
- Stevens, S.S.; Volkmann, J.; Newman, E.B. A scale for the measurement of the psychological magnitude pitch. J. Acoust. Soc. Am. 1937, 8, 185–190. [Google Scholar] [CrossRef]
- Rabiner, L.; Juang, B.H. Fundamentals of Speech Recognition; Prentice-Hall, Inc.: Upper Saddle River, NJ, USA, 1993. [Google Scholar]
- ISO/IEC 11172-3; Information Technology—Coding of Moving Pictures and Associated Audio for Digital Storage Media at up to About 1.5 Mbit/s—Part 3: Audio. Standard for MPEG-1 Audio Layer I/II/III (Including MP3); ISO: Geneva, Switzerland, 1993.
- Wan, L.; Wang, Q.; Papir, A.; Moreno, I.L. Generalized End-to-End Loss for Speaker Verification. In Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, AB, Canada, 15–20 April 2018; pp. 4879–4883. [Google Scholar]
- Hannun, A.; Case, C.; Jared Casper, B.C.; Diamos, G.; Erich Elsen, R.P.; Satheesh, S.; Sengupta, S.; Coates, A.; Ng, A.Y. Deep Speech: Scaling up end-to-end speech recognition. arXiv 2014, arXiv:1412.5567. [Google Scholar]
- Li, L.; Liu, M.; Yao, Y.; Dang, F.; Liu, Y. Patronus: Preventing unauthorized speech recordings with support for selective unscrambling. In Proceedings of the 18th ACM Conference on Embedded Networked Sensor Systems (SenSys’20), Virtual Event, 16–19 November 2020. [Google Scholar]
- Hao, X.; Su, X.; Horaud, R.; Li, X. Fullsubnet: A Full-Band and Sub-Band Fusion Model for Real-Time Single-Channel Speech Enhancement. In Proceedings of the ICASSP 2021—2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, ON, Canada, 6–11 June 2021; pp. 6633–6637. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, Z.; Tang, L.; Wang, K.; Tang, X.; Ge, H. Dynamic Ultrasonic Jamming via Time–Frequency Mosaic for Anti-Eavesdropping Systems. Electronics 2025, 14, 2960. https://doi.org/10.3390/electronics14152960
Yu Z, Tang L, Wang K, Tang X, Ge H. Dynamic Ultrasonic Jamming via Time–Frequency Mosaic for Anti-Eavesdropping Systems. Electronics. 2025; 14(15):2960. https://doi.org/10.3390/electronics14152960
Chicago/Turabian StyleYu, Zichuan, Lu Tang, Kai Wang, Xusheng Tang, and Hongyu Ge. 2025. "Dynamic Ultrasonic Jamming via Time–Frequency Mosaic for Anti-Eavesdropping Systems" Electronics 14, no. 15: 2960. https://doi.org/10.3390/electronics14152960
APA StyleYu, Z., Tang, L., Wang, K., Tang, X., & Ge, H. (2025). Dynamic Ultrasonic Jamming via Time–Frequency Mosaic for Anti-Eavesdropping Systems. Electronics, 14(15), 2960. https://doi.org/10.3390/electronics14152960