loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Chenguang Yang 1 ; Ghaith Hammouri 2 and Berk Sunar 1

Affiliations: 1 Worcester Polytechnic Institute, United States ; 2 Claveo Software, United States

ISBN: 978-989-8565-24-2

Keyword(s): Voice, Entropy, Mel Frequency Cepstral Coefficients, Gaussian Mixture Model.

Related Ontology Subjects/Areas/Topics: Biometrics Security and Privacy ; Identification, Authentication and Non-Repudiation ; Information and Systems Security

Abstract: We demonstrate an attack on basic voice authentication technologies. Specifically, we show how one member of a voice database can manipulate his voice in order to gain access to resources by impersonating another member in the same database. The attack targets a voice authentication system build around parallel and independent speech recognition and speaker verification modules and assumes that adapted Gaussian Mixture Model (GMM) is used to model basic Mel-frequency cepstral coefficients (MFCC) features of speakers. We experimentally verify our attack using the YOHO database. The experiments conclude that in a database of 138 users an attacker can impersonate anyone in the database with a 98% success probability after at most nine authorization attempts. The attack still succeeds, albeit at lower success rates, if fewer attempts are permitted. The attack is quite practical and highlights the limited amount of entropy that can be extracted from the human voice when using MFCC features.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.175.191.72

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Yang, C.; Hammouri, G. and Sunar, B. (2012). Voice Passwords Revisited.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 163-171. DOI: 10.5220/0004060201630171

@conference{secrypt12,
author={Chenguang Yang. and Ghaith Hammouri. and Berk Sunar.},
title={Voice Passwords Revisited},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={163-171},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004060201630171},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Voice Passwords Revisited
SN - 978-989-8565-24-2
AU - Yang, C.
AU - Hammouri, G.
AU - Sunar, B.
PY - 2012
SP - 163
EP - 171
DO - 10.5220/0004060201630171

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.