JOURNAL ARTICLE

Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram

Abstract

Deep learning-enabled Voice User Interfaces (VUIs) have surpassed human-level performance in acoustic perception tasks. However, the significant cost associated with training these models compels users to rely on third-party data or outsource training services. Such emerging trends have drawn substantial attention to training-phase attacks, particularly backdoor attacks. Such attacks implant hidden trigger patterns (e.g., tones, environmental sounds) into the model during training, thereby manipulating the model's predictions in the inference phase. However, existing backdoor attacks can be easily undermined in practice as the inserted triggers are audible. Users may notice such attacks when listening to the training data and remaining alert for suspicious sounds. In this work, we present a novel audio backdoor attack that exploits completely inaudible triggers in the frequency domain of the audio spectrograms. Specifically, we optimize the trigger to be a frequency-domain pattern with the energy below the noise floor (e.g., background and hardware noises) at any given frequency, thereby rendering the trigger inaudible. To realize such attacks, we design a strategy that automatically generates inaudible triggers in the spectrum supported by commodity playback devices (e.g., smartphones and laptops). We further develop optimization techniques to enhance the trigger's robustness against speech content and onset variations. Experiments on hotword and speaker recognition indicate that our attack can achieve attack success rates of more than 98.2% and 81.0% under digital and physical attack scenarios. The results also demonstrate the trigger's inaudibility with a Signal-to-Noise Ratio (SNR) less than -3.54 dB against background noises. We further verify that our attack can successfully bypass state-of-the-art backdoor defense strategies based on learning and audio processing.

Keywords:
Backdoor Computer science Spectrogram Robustness (evolution) Exploit Speech recognition Rendering (computer graphics) Frequency domain Bespoke Noise (video) Computer security Artificial intelligence Computer vision

Metrics

5
Cited By
2.65
FWCI (Field Weighted Citation Impact)
44
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Speech Recognition and Synthesis
Physical Sciences →  Computer Science →  Artificial Intelligence
Music and Audio Processing
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger

Zhe YeDiqun YanLi DongJiacheng DengShui Yu

Journal:   IEEE Signal Processing Letters Year: 2023 Vol: 30 Pages: 1057-1061
JOURNAL ARTICLE

Stealthy graph backdoor attack based on feature trigger

Yang ChenBin ZhouHaixing Zhao

Journal:   Complex & Intelligent Systems Year: 2025 Vol: 11 (8)
JOURNAL ARTICLE

Simtrojan: Stealthy Backdoor Attack

Yankun RenLongfei LiJun Zhou

Year: 2021 Pages: 819-823
JOURNAL ARTICLE

RF Domain Backdoor Attack on Signal Classification via Stealthy Trigger

Zijie TangTianming ZhaoTianfang ZhangHuy PhanYan WangCong ShiBo YuanYingying Chen

Journal:   IEEE Transactions on Mobile Computing Year: 2024 Vol: 23 (12)Pages: 11765-11780
© 2026 ScienceGate Book Chapters — All rights reserved.