Attacks on Speech Biometric Authentication
نویسنده
چکیده
We investigate the security of DTW, VQ and GMM methods that have been used in speaker authentication systems. We present attack models based on adversary knowledge. We start with naive adversaries without knowledge of an authentic speaker and develop them into highly knowledgeable adversaries who know the speaker’s information, have the speaker’s voice samples, acquire the speaker’s template, and know an algorithm of the speaker authentication system. We propose an analysis-synthesis forgery in which the informed adversary can exploit information such as feature vectors from the template and a statistical probability from the voice samples of the target speakers to re-generate a forgery that can be used in remote or on-line authentication. We evaluate our scheme with two speech datasets. The results show that the proposed scheme outperforms other attack models reported in the literature.
منابع مشابه
Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملDetection of PARD Attack on Secure Authentication System Based on Fingerprint Impression
The trustworthy information security mechanisms are required to contend with the rising atrociousness of identity theft in the cyber and electronic society, the biometric like fingerprint authentication can be used to ensure that only the legitimate user can access to intended system. Although the biometric authentication systems are very secured but the biometric systems are also exposed to a ...
متن کاملSpoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerab...
متن کاملA Privacy-Preserving Biometric Authentication Protocol Revisited
Biometric authentication establishes the identity of an individual based on biometric templates (i.e. fingerprints, retina scans etc.). Although biometric authentication has important advantages and many applications, it also raises serious security and privacy concerns. In this parer, we investigate a privacy-preserving biometric authentication protocol that has been proposed by Bringer et al....
متن کاملAnalysis of Multimodal Biometric System Based on Level of Fusion
User authentication is essential to provide security that restricts access to system and data resources. Biometric system refers to an recognition of legitimate user based on a feature vector(s) derived from their distinguishing behavioral and/or physiological traits like face, finger, speech iris, gait, etc., Research on biometrics has distinctly increased for solving identification and authen...
متن کاملSecure Mobile Payment thanks to a very safe, comfortable, and fake-resistant biometric authentication
This unique solution will ensure that only the authorized person has access to the respective mobile applications, unauthorized access will be denied. It is very safe and very easy to use. Mobile Communication Biometrics how it works and where it can be used By pressing a specific soft button or icon on the mobile phone, four randomly selected numerals appear successively on the mobile phone di...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011