2018 International Carnahan Conference on Security Technology (ICCST) 2018
DOI: 10.1109/ccst.2018.8585464
|View full text |Cite
|
Sign up to set email alerts
|

Performing a Presentation Attack Detection on Voice Biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Replay attacks are possible in non-cooperative cases (no target participation required), but mimicry (organic and digital attempts to replicate another individual's voice) or voice conversion attacks (digital masking of the attacker's voice as the target's) could also be used, depending on the home assistant's use of voice biometrics. 16 Finally, the attacker disables the camera and enters the home with no sign of forced entry. A VPN masks their identity in the event the camera logs access.…”
Section: A Case Study In Villainizing Voicementioning
confidence: 99%
See 1 more Smart Citation
“…Replay attacks are possible in non-cooperative cases (no target participation required), but mimicry (organic and digital attempts to replicate another individual's voice) or voice conversion attacks (digital masking of the attacker's voice as the target's) could also be used, depending on the home assistant's use of voice biometrics. 16 Finally, the attacker disables the camera and enters the home with no sign of forced entry. A VPN masks their identity in the event the camera logs access.…”
Section: A Case Study In Villainizing Voicementioning
confidence: 99%
“…banking and aspects of home automation. 16 Today, Apple uses this approach to authorize access to Siri while Google uses "Trusted Voice" and banks use Nuance's "Free Speech." 19 It may even be possible to infer a voice's emotional state 20 to detect whether a voice command was issued by humans under duress.…”
Section: Addressing Open-channel Vulnerabilitiesmentioning
confidence: 99%