Breaking voice authentication - Security testing approach

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

A couple of years ago, along with raising popularity of smart devices that promote voice authentication mechanisms, voice recognition became a buzz topic again. Not only voice patterns recognition algorithms significantly improved their quality, but also with a rapid growth in the development of sound editing tools and an outburst of the deep-fake concepts, the attack surface of voice authenticators significantly expanded. This paper describes the approach for penetration testing of the voice recognition solutions and tackles common misconceptions of voice patterns characteristics.

Cite

CITATION STYLE

APA

Dziegielewska, O. (2021). Breaking voice authentication - Security testing approach. IBIMA Business Review, 2021. https://doi.org/10.5171/2021.198312

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free