Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …
learning make deepfakes highly believable, and very difficult to differentiate between what is …
Breaking Security-Critical Voice Authentication
A Kassis, U Hengartner - 2023 IEEE Symposium on Security …, 2023 - ieeexplore.ieee.org
Voice authentication (VA) has recently become an integral part in numerous security-critical
operations, such as bank transactions and call center conversations. The vulnerability of …
operations, such as bank transactions and call center conversations. The vulnerability of …
Practical attacks on voice spoofing countermeasures
A Kassis, U Hengartner - arXiv preprint arXiv:2107.14642, 2021 - arxiv.org
Voice authentication has become an integral part in security-critical operations, such as
bank transactions and call center conversations. The vulnerability of automatic speaker …
bank transactions and call center conversations. The vulnerability of automatic speaker …
Alexa, it's me! an online survey on the user experience of smart speaker authentication
Verifying the identify of the speaker is a crucial requirement for security-critical voice-based
services on smart speakers, such as transferring money or making online purchases. Whilst …
services on smart speakers, such as transferring money or making online purchases. Whilst …
Accuth: Anti-spoofing voice authentication via accelerometer
Most existing voice-based user authentication systems mainly rely on microphones to
capture the unique vocal characteristics of an individual, which makes these systems …
capture the unique vocal characteristics of an individual, which makes these systems …
Accuth: Accelerometer-based Anti-Spoofing Voice Authentication on Wrist-worn Wearables
Most existing voice-based user authentication systems mainly rely on microphones to
capture the unique vocal characteristics of an individual, which are vulnerable to various …
capture the unique vocal characteristics of an individual, which are vulnerable to various …
Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations
In this paper, we present Jawthenticate, an earable system that authenticates a user using
audible or inaudible speech without using a microphone. This system can overcome the …
audible or inaudible speech without using a microphone. This system can overcome the …
Authentication methods for voice services on smart speakers–a multi-method study on perceived security and ease of use
A Renz, T Neff, M Baldauf, E Maier - i-com, 2023 - degruyter.com
With the increasing proliferation of security-critical voice-based services such as voice
banking, user authentication on smart speakers is becoming a vital requirement. Prior …
banking, user authentication on smart speakers is becoming a vital requirement. Prior …
Artificial intelligence meets kinesthetic intelligence: Mouse-based user authentication based on hybrid human-machine learning
Current mainstream biometric user authentication approaches are based on passive
measurements of the subject's characteristics, and usually come with less-than-satisfactory …
measurements of the subject's characteristics, and usually come with less-than-satisfactory …
Protecting Your Voice from Speech Synthesis Attacks
In recent years, much attention has been paid to speech synthesis, which aims to generate
synthetic speeches in a voice of a target speaker. Although the speech synthesis technique …
synthetic speeches in a voice of a target speaker. Although the speech synthesis technique …