Breaking security-critical voice authentication

A Kassis, U Hengartner - 2023 IEEE Symposium on Security …, 2023 - ieeexplore.ieee.org
Voice authentication (VA) has recently become an integral part in numerous security-critical
operations, such as bank transactions and call center conversations. The vulnerability of …

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

M Panariello, W Ge, H Tak, M Todisco… - arxiv preprint arxiv …, 2023 - arxiv.org
We present Malafide, a universal adversarial attack against automatic speaker verification
(ASV) spoofing countermeasures (CMs). By introducing convolutional noise using an …

Waveform level adversarial example generation for joint attacks against both automatic speaker verification and spoofing countermeasures

X Zhang, X Zhang, W Liu, X Zou, M Sun… - Engineering Applications of …, 2022 - Elsevier
Adversarial examples crafted to deceive Automatic Speaker Verification (ASV) systems have
attracted a lot of attention when studying the vulnerability of ASV. However, real-world ASV …

GANBA: Generative adversarial network for biometric anti-spoofing

A Gomez-Alanis, JA Gonzalez-Lopez, AM Peinado - Applied Sciences, 2022 - mdpi.com
Automatic speaker verification (ASV) is a voice biometric technology whose security might
be compromised by spoofing attacks. To increase the robustness against spoofing attacks …

Spoofing attack augmentation: Can differently-trained attack models improve generalisation?

W Ge, X Wang, J Yamagishi… - ICASSP 2024-2024 …, 2024 - ieeexplore.ieee.org
A reliable deepfake detector or spoofing countermeasure (CM) should be robust in the face
of unpredictable spoofing attacks. To encourage the learning of more generaliseable …

语音伪造及检测技术研究综述

任延珍, 刘晨雨, 刘武洋, 王丽娜 - 信号处理, 2021 - signal.ejournal.org.cn
语音承载着人类语言和说话人身份信息, 通过语音伪造技术可以精确模仿目标说话人的声音以
达到欺骗人或机器听觉的目的. 目前, 深度伪造(Deepfake) **在对全球的政治经济及社会稳定带 …

Automatic speaker verification and replay attack detection system using novel glottal flow cepstrum coefficients

Y Banaras, A Javed, F Hassan - 2021 International Conference …, 2021 - ieeexplore.ieee.org
With the growing number of devices that use voice biometric system for verification
purposes, it becomes mandatory to accurately verify the target speaker. Moreover, intruders …

[PDF][PDF] On the application of conformers to logical access voice spoofing attack detection

E Rosello, A Gomez-Alanis, M Chica, AM Gomez… - Proc …, 2022 - isca-archive.org
Biometric systems are exposed to spoofing attacks which may compromise their security,
and automatic speaker verification (ASV) is no exception. To increase the robustness …

[PDF][PDF] Signal and Neural Processing against Spoofing Attacks and Deepfakes for Secure Voice Interaction (ASASVI)

AM Gómez, AM Peinado, VE Sánchez… - Proc. IberSPEECH …, 2024 - isca-archive.org
The increasing sophistication of multimodal interaction systems, which enable human-like
communication, raises concerns regarding the authenticity of exchanged speech data. Our …

On-Device Voice Authentication with Paralinguistic Privacy

R Aloufi, H Haddadi, D Boyle - arxiv preprint arxiv:2205.14026, 2022 - arxiv.org
Using our voices to access, and interact with, online services raises concerns about the
trade-offs between convenience, privacy, and security. The conflict between maintaining …