Phipps et al., 2022 - Google Patents
Securing voice communications using audio steganographyPhipps et al., 2022
View PDF- Document ID
- 6972752635029074678
- Author
- Phipps A
- Ouazzane K
- Vassilev V
- Publication year
- Publication venue
- International Journal of Computer Network and Information Security (IJCNIS)
External Links
Snippet
Although authentication of users of digital voice-based systems has been addressed by much research and many commercially available products, there are very few that perform well in terms of both usability and security in the audio domain. In addition, the use of voice …
- 238000000034 method 0 abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cheng et al. | Personal voice assistant security and privacy—a survey | |
CN110647730B (en) | Single channel input multi-factor authentication via separate processing paths | |
Shirvanian et al. | Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones | |
Mukhopadhyay et al. | All your voices are belong to us: Stealing voices to fool humans and machines | |
US10146923B2 (en) | Audiovisual associative authentication method, related system and device | |
US9571490B2 (en) | Method and system for distinguishing humans from machines | |
US8862888B2 (en) | Systems and methods for three-factor authentication | |
US10665244B1 (en) | Leveraging multiple audio channels for authentication | |
US10623403B1 (en) | Leveraging multiple audio channels for authentication | |
JP6594349B2 (en) | Method and apparatus for identifying or authenticating humans and / or objects with dynamic acoustic security information | |
JP2006164237A (en) | User authentication by combination of speaker reference and reverse turing test | |
US20190213306A1 (en) | System and method for identity authentication | |
Ponticello et al. | Exploring authentication for {Security-Sensitive} tasks on smart home voice assistants | |
Shrestha et al. | Listening watch: Wearable two-factor authentication using speech signals resilient to near-far attacks | |
Esposito et al. | Alexa versus alexa: Controlling smart speakers by self-issuing voice commands | |
Lit et al. | A survey on amazon alexa attack surfaces | |
Chang et al. | My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants | |
Phipps et al. | Securing voice communications using audio steganography | |
Turner et al. | Attacking speaker recognition systems with phoneme morphing | |
Zhang et al. | Volere: Leakage resilient user authentication based on personal voice challenges | |
Zhang et al. | LiVoAuth: Liveness Detection in Voiceprint Authentication with Random Challenges and Detection Modes | |
Johnson et al. | Voice authentication using short phrases: Examining accuracy, security and privacy issues | |
Shirvanian et al. | Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines | |
Alattar et al. | Privacy‐preserving hands‐free voice authentication leveraging edge technology | |
Phipps et al. | Enhancing cyber security using audio techniques: a public key infrastructure for sound |