Sokolov et al., 2020 - Google Patents
Modern social engineering voice cloning technologiesSokolov et al., 2020
- Document ID
- 4882277150717141677
- Author
- Sokolov S
- Alimov O
- Tyapkin D
- Katorin Y
- Moiseev A
- Publication year
- Publication venue
- 2020 IEEE conference of russian young researchers in electrical and electronic engineering (EIConRus)
External Links
Snippet
Today, new methods of fraud are actively increasing depending on the development of technology. The current ways of influencing the victim, which seemed impossible 10 years ago, is part of the modern era. Now cybercrime tools are easy to use and accessible to …
- 238000010367 cloning 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111052230B (en) | Speech activated selective memory for speech capture device | |
Yuan et al. | {CommanderSong}: a systematic approach for practical adversarial voice recognition | |
CN110800044B (en) | Utterance rights management for voice assistant systems | |
US10665244B1 (en) | Leveraging multiple audio channels for authentication | |
JP6697265B2 (en) | Using the ability to speak as proof of human interaction | |
US11706217B2 (en) | Managing voice applications within a digital workspace | |
CN105069874B (en) | A kind of mobile Internet sound-groove gate inhibition system and its implementation | |
Malik et al. | Towards vulnerability analysis of voice-driven interfaces and countermeasures for replay attacks | |
US10623403B1 (en) | Leveraging multiple audio channels for authentication | |
US10706848B1 (en) | Anomaly detection for voice controlled devices | |
Sharif et al. | Smart home voice assistants: a literature survey of user privacy and security vulnerabilities | |
Lit et al. | A survey on amazon alexa attack surfaces | |
Sokolov et al. | Modern social engineering voice cloning technologies | |
Zhang et al. | Using AI to attack VA: a stealthy spyware against voice assistances in smart phones | |
Dixit et al. | Review of audio deepfake detection techniques: Issues and prospects | |
Wang et al. | Vsmask: Defending against voice synthesis attack via real-time predictive perturbation | |
CN115035903A (en) | Physical voice watermark injection method, voice tracing method and device | |
US10949153B2 (en) | Methods and systems for facilitating the generation of a customized response based on a context | |
JP2019028465A (en) | Speaker verification method and speech recognition system | |
Guo et al. | PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection | |
Bispham et al. | A taxonomy of attacks via the speech interface | |
Wu et al. | HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks | |
Phipps et al. | Securing voice communications using audio steganography | |
CN110428844A (en) | Speech verification method, electronic equipment, audio frequency apparatus and the medium of electronic equipment | |
McCarthy et al. | Shouting Through Letterboxes: A study on attack susceptibility of voice assistants |