• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Voice recognition systems easily fooled by impersonators, claims Finnish university study

Cyber crooks can compromise speech recognition systems with ease, claim researchers at the University of Eastern Finland

Voice recognition systems easily fooled by impersonators, claims Finnish university study
Rory Bremner playing Tony Blair (alongside Andrew Dunn playing Alastair Campbell). Image copyright BBC
  • Nicholas Fearn
  • Nicholas Fearn
  • 14 November 2017
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

Researchers from the University of Eastern Finland claim that it is relatively easy for hackers to crack supposedly top-of-the-line voice recognition systems due to poor security. 

Skillful voice impersonators can fool the systems because they aren't efficient in recognising voice modifications, according to the study, published today.

Most mobile devices come with voice recognition and command technologies built-in, but many of these systems lack appropriate security mechanisms and can be compromised by hackers.

These services are used to dictate messages, translate phrases and conduct search queries, and increasing adoption presents a potential opportunity for cyber crooks.

The study shows that cyber criminals are using different technologies to get into speaker recognition software, such as voice conversion, speech synthesis and replay attacks.

Although experts are coming up with techniques and countermeasures to fight back against such attacks, voice modifications produced by humans can't be detected easily.

Voice impersonation, the University said, is common in the entertainment industry. Professionals and amateurs are commonly copying voice characteristics of other speakers, notably public figures.

There's also the issue of "voice disguise", where speakers change the way they speak to avoid being recognised. The latter is common in situations that don't require face-to-face communication.

And, as a result, people can blackmail others or conduct threatening calls. Because of this, there's a need to improve the robustness of voice recognition systems so that they aren't exposed to human-induced voice modifications.

In the study, researchers analysed the speech of two professional impersonators mimicking eight Finnish public figures. It also looked at acted speech from 60 Finnish speakers, who participated in recording sessions.

The speakers were asked to fake their age by changing their voices to sound older or younger, and an overwhelming number of them were able to trick the speech systems.

Tom Harwood, chief product officer and co-founder at Aeriandi, said: "Biometrics technology has been shown to significantly reduce fraud, especially in the financial sector - but it's not the whole solution.

"Earlier this year, twins tricked the HSBC voice biometrics security system, and this instance showed that no security technology is 100% fool-proof.

"Technology advances have also shown that it is now possible to cheat voice recognition systems. Voice synthesiser technology is a great example.

"It makes it possible to take an audio recording and alter it to include words and phrases the original speaker never spoke, thus making voice biometric authentication insecure.

He added: "The good news is that there is a way to protect against phone fraud beyond biometrics - and that's fraud detection technology. Fraud detection on voice looks at more than the voice print of the user; it considers a whole host of other parameters.

"For example, is the phone number being used legitimate? Where is the caller located? Increasingly phone fraud attacks on UK banks come from overseas. Voice Fraud technology has been proven to protect against this as well as domestic threats." 

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Mobile Phones
  • Hardware
  • Hacking
  • hackers
  • voice recognition
  • University of Eastern Finland

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017