Enhancing voice biometric security: Evaluating neural network and human capabilities in detecting cloned voices
Abstrakt
This study assesses speaker verification efficacy in detecting cloned voices, particularly in safety-critical applications such as healthcare documentation and banking biometrics. It compares deeply trained neural networks like the DeepSpeaker with human listeners in recognizing these cloned voices, underlining the severe implications of voice cloning in these sectors. Cloned voices in healthcare could endanger patient safety by altering medical records, causing inaccurate diagnoses and treatments. In banking, they threaten biometric security, increasing the risk of financial fraud and identity theft. We tested feature extraction strategies using up to 40 parameters, including MFCC, GFCC, LFCC, CQCC, MSRCC, and others computed with the Simplified Python Audio Features Extraction (spafe libraries) or Librosa. We verified the feature vectors using Feature Ranking (Random Forest-derived) and performed dimensionality reduction using Principal Component Analysis (PCA). Our central research question was whether using the voice cloning method to effectively attack the advanced authentication systems is possible. The research reveals the neural network's superiority over human detection in pinpointing cloned voices, underscoring the urgent need for sophisticated AI-based security.
Cytowania
-
0
CrossRef
-
0
Web of Science
-
0
Scopus
Autor (1)
Cytuj jako
Pełna treść
pełna treść publikacji nie jest dostępna w portalu
Słowa kluczowe
Informacje szczegółowe
- Kategoria:
- Publikacja w czasopiśmie
- Typ:
- artykuły w czasopismach
- Opublikowano w:
-
Journal of the Acoustical Society of America
nr 155,
ISSN: 0001-4966 - Język:
- angielski
- Rok wydania:
- 2024
- Opis bibliograficzny:
- Czyżewski A.: Enhancing voice biometric security: Evaluating neural network and human capabilities in detecting cloned voices// Journal of the Acoustical Society of America -,iss. 155, 3 (2024), s.1-16
- DOI:
- Cyfrowy identyfikator dokumentu elektronicznego (otwiera się w nowej karcie) 10.1121/2.0001978
- Źródła finansowania:
- Weryfikacja:
- Politechnika Gdańska
wyświetlono 7 razy
Publikacje, które mogą cię zainteresować
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
- L. Fei,
- Z. Jiayan,
- S. Jiaqi
- + 1 autorów
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
- M. Wang,
- T. Sirlapu,
- A. Kwaśniewska
- + 3 autorów