As voice interfaces become more widely available they increasingly implement speaker recognition, to provide both personalized functionalities and security via authentication. In this paper, we present a method that transforms the voice of one person so that it resembles the voice of a victim, such that it can be used to deceive speaker recognition systems into believing an utterance was spoken by the victim. The transformation only requires short pieces of audio recordings from the source and victim voices, and does not require specific words to be spoken by the victim. We show that the attack can be improved by using a population of source voices and we provide a metric to identify promising source voices, from within such a population. ...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
We mount an effective attack on a third-party open-source text-independent speaker verification syst...
Voice interfaces continue to grow in popularity, with standalone systems being deployed in our homes...
Recent years have seen a proliferation of systems designed to respond to voice, e.g., smart speakers...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
Speaker verification systems use human voices as an important biometric to identify legitimate users...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
In this paper, we propose dictionary attacks against speaker verification - a novel attack vector th...
Abstract Voice interfaces are becoming more ubiquitous and are now the primary input method for many...
Voice-user interface (VUI) has exploded in popularity due to the recent advances in automatic speech...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
We mount an effective attack on a third-party open-source text-independent speaker verification syst...
Voice interfaces continue to grow in popularity, with standalone systems being deployed in our homes...
Recent years have seen a proliferation of systems designed to respond to voice, e.g., smart speakers...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
Speech signals are a rich source of speaker-related information including sensitive attributes like ...
Speaker verification systems use human voices as an important biometric to identify legitimate users...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
International audienceSpeech data conveys sensitive speaker attributes like identity or accent. With...
In this paper, we propose dictionary attacks against speaker verification - a novel attack vector th...
Abstract Voice interfaces are becoming more ubiquitous and are now the primary input method for many...
Voice-user interface (VUI) has exploded in popularity due to the recent advances in automatic speech...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
We mount an effective attack on a third-party open-source text-independent speaker verification syst...