Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors

A Firc, K Malinka, P Hanáček - Heliyon, 2023 - cell.com
Deepfakes present an emerging threat in cyberspace. Recent developments in machine
learning make deepfakes highly believable, and very difficult to differentiate between what is …

Breaking Security-Critical Voice Authentication

A Kassis, U Hengartner - 2023 IEEE Symposium on Security …, 2023 - ieeexplore.ieee.org
Voice authentication (VA) has recently become an integral part in numerous security-critical
operations, such as bank transactions and call center conversations. The vulnerability of …

Practical attacks on voice spoofing countermeasures

A Kassis, U Hengartner - arXiv preprint arXiv:2107.14642, 2021 - arxiv.org
Voice authentication has become an integral part in security-critical operations, such as
bank transactions and call center conversations. The vulnerability of automatic speaker …

Alexa, it's me! an online survey on the user experience of smart speaker authentication

A Renz, M Baldauf, E Maier, F Alt - Proceedings of Mensch und …, 2022 - dl.acm.org
Verifying the identify of the speaker is a crucial requirement for security-critical voice-based
services on smart speakers, such as transferring money or making online purchases. Whilst …

Accuth: Anti-spoofing voice authentication via accelerometer

F Han, P Yang, H Du, XY Li - Proceedings of the 20th ACM Conference …, 2022 - dl.acm.org
Most existing voice-based user authentication systems mainly rely on microphones to
capture the unique vocal characteristics of an individual, which makes these systems …

Accuth: Accelerometer-based Anti-Spoofing Voice Authentication on Wrist-worn Wearables

F Han, P Yang, H Du, XY Li - IEEE Transactions on Mobile …, 2023 - ieeexplore.ieee.org
Most existing voice-based user authentication systems mainly rely on microphones to
capture the unique vocal characteristics of an individual, which are vulnerable to various …

Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations

T Srivastava, S Pan, P Nguyen, S Jain - … of the 21st ACM Conference on …, 2023 - dl.acm.org
In this paper, we present Jawthenticate, an earable system that authenticates a user using
audible or inaudible speech without using a microphone. This system can overcome the …

Authentication methods for voice services on smart speakers–a multi-method study on perceived security and ease of use

A Renz, T Neff, M Baldauf, E Maier - i-com, 2023 - degruyter.com
With the increasing proliferation of security-critical voice-based services such as voice
banking, user authentication on smart speakers is becoming a vital requirement. Prior …

Artificial intelligence meets kinesthetic intelligence: Mouse-based user authentication based on hybrid human-machine learning

S Fu, D Qin, G Amariucai, D Qiao, Y Guan… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Current mainstream biometric user authentication approaches are based on passive
measurements of the subject's characteristics, and usually come with less-than-satisfactory …

Protecting Your Voice from Speech Synthesis Attacks

Z Liu, Y Zhang, C Miao - Proceedings of the 39th Annual Computer …, 2023 - dl.acm.org
In recent years, much attention has been paid to speech synthesis, which aims to generate
synthetic speeches in a voice of a target speaker. Although the speech synthesis technique …