Voice Morphing: Two Identities in One Voice

09/05/2023
by   Sushanta K. Pani, et al.
0

In a biometric system, each biometric sample or template is typically associated with a single identity. However, recent research has demonstrated the possibility of generating "morph" biometric samples that can successfully match more than a single identity. Morph attacks are now recognized as a potential security threat to biometric systems. However, most morph attacks have been studied on biometric modalities operating in the image domain, such as face, fingerprint, and iris. In this preliminary work, we introduce Voice Identity Morphing (VIM) - a voice-based morph attack that can synthesize speech samples that impersonate the voice characteristics of a pair of individuals. Our experiments evaluate the vulnerabilities of two popular speaker recognition systems, ECAPA-TDNN and x-vector, to VIM, with a success rate (MMPMR) of over 80

READ FULL TEXT
research
05/18/2018

Security Vulnerabilities Against Fingerprint Biometric System

The biometric system is an automatic identification and authentication s...
research
11/30/2019

Biometric Recognition Using Deep Learning: A Survey

Deep learning-based models have been very successful in achieving state-...
research
03/15/2019

Twins Recognition with Multi Biometric System: Handcrafted-Deep Learning Based Multi Algorithm with Voice-Ear Recognition Based Multi Modal

With the development of technology, the usage areas and importance of bi...
research
01/10/2023

Diffusion Models For Stronger Face Morphing Attacks

Face morphing attacks seek to deceive a Face Recognition (FR) system by ...
research
04/04/2023

Untargeted Near-collision Attacks in Biometric Recognition

A biometric recognition system can operate in two distinct modes, identi...
research
05/31/2020

Evaluation of biometric user authentication using an ensemble classifier with face and voice recognition

This paper presents a biometric user authentication system based on an e...
research
05/22/2019

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

In this work, we investigate the concept of biometric backdoors: a templ...

Please sign up or login with your details

Forgot password? Click here to reset