An Attack on a Text-independent Speaker Authentication System
ثبت نشده
چکیده
We mount an effective attack on a third-party open-source text-independent speaker verification system. Specifically, we show how an attacker can simply use a signal generated at fixed frequency to pass speaker verification and gain access to other user accounts. We demonstrate this attack on the GMM-UBM based ALIZE speaker verification system using the YOHO voice database. We show through experimentation that the attacker can impersonate any users in the database of 69 people with about 25% success rate with only 5 trials. The success rate can achieve more than 50% by increasing the allowed authentication attempts to 20. These success rates are significantly higher than the rates achievable by exploiting the false positive rate of the speaker verification system using random trials.
منابع مشابه
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملKernel Based Text-independnent Speaker Verification
The goal of a person authentication system is to authenticate the claimed identity of a user. When this authentication is based on the voice of the user, without respect of what the user exactly said, the system is called a text-independent speaker verification system. Speaker verification systems are increasingly often used to secure personal information, particularly for mobile phone based ap...
متن کاملText dependent speaker verification using a small development set
Voice biometrics for user authentication is a task in which the object is to perform convenient, robust and secure authentication of speakers. Recently we have investigated the use of state-of-the-art text-independent and text-dependent speaker verification technology for user authentication and obtained satisfactory results within a framework of a proof of technology. However, the use we have ...
متن کاملVoice Biometric System for Speaker Authentication
This paper discusses the implementation of a text-independent, biometric, Speaker Recognition based security system. Such a bio-metric model can be used to identify a person based on his
متن کاملAutomatic Speaker Recognition System
Spoken language is used by human to convey many types of information. Primarily, speech convey message via words. Owing to advanced speech technologies, people's interactions with remote machines, such as phone banking, internet browsing, and secured information retrieval by voice, is becoming popular today. Speaker verification and speaker identification are important for authentication and ve...
متن کامل