UAB Research Finds Security Risks with Computer Created Voices

 ========= Old Image Removed =========Array
(
    [_wp_attached_file] => Array
        (
            [0] => 2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png
        )

    [_wp_attachment_metadata] => Array
        (
            [0] => a:5:{s:5:"width";i:640;s:6:"height";i:342;s:4:"file";s:81:"2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png";s:5:"sizes";a:10:{s:6:"medium";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-336x180.png";s:5:"width";i:336;s:6:"height";i:180;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-140x140.png";s:5:"width";i:140;s:6:"height";i:140;s:9:"mime-type";s:9:"image/png";}s:9:"wbhm-icon";a:4:{s:4:"file";s:79:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-80x80.png";s:5:"width";i:80;s:6:"height";i:80;s:9:"mime-type";s:9:"image/png";}s:13:"wbhm-featured";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x338.png";s:5:"width";i:600;s:6:"height";i:338;s:9:"mime-type";s:9:"image/png";}s:20:"wbhm-featured-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:18:"wbhm-featured-home";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-582x311.png";s:5:"width";i:582;s:6:"height";i:311;s:9:"mime-type";s:9:"image/png";}s:22:"wbhm-featured-carousel";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-470x251.png";s:5:"width";i:470;s:6:"height";i:251;s:9:"mime-type";s:9:"image/png";}s:28:"ab-block-post-grid-landscape";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:25:"ab-block-post-grid-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-125x125.png";s:5:"width";i:125;s:6:"height";i:125;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}
        )

)
1637578552 
1497345881

What if someone could take a recording of your voice and use it to create a digital version? In other words, he or she could use a computer to make it sound like you’re saying anything. A few weeks ago, the Canadian startup Lyrebird released a computer-generated conversation between some familiar voices.

It’s not the most natural-sounding, but you can probably tell the voices mimic Presidents Donald Trump, Barack Obama, and former Secretary of State Hilary Clinton. The technology has applications beyond parlor tricks. It’s also raising security concerns. That’s because we use our voices to identify ourselves.

Digital assistants such as Apple’s Siri or Amazon’s Alexa are designed to recognize a specific voice. Otherwise anyone shouting “Hey, Siri” could unlock any phone. Beyond that, some banks are now using voice recognition software to allow customers to access financial information by phone. Your voice essentially becomes a password.

But perhaps it’s not a very good password if software can now mimic your voice. Think about how many voices could be collected from YouTube videos or surreptitiously recorded with a smart phone.

So a team with UAB’s SPIES research group, which looks at emerging security and privacy issues, tackled a key question: is this type of security vulnerable to impersonation?

The study looked at two things. First, would a computer recognize and thus reject the fake voice? Turns out, according to this study, the synthesized voice fooled the computer more than 80 percent of the time.

“It’s not secure at all,” says Maliheh Shirvanian, who was part of the research team.

The second part of the study tested humans. Could they tell the difference between a real and fake voice? Test subjects listened to clips of Morgan Freeman and one like this.

Or maybe this…

That’s a fake Oprah Winfrey followed by her real voice.

People got it right only about half the time. Better than the computer but still no better than chance.

When this study came out in 2015, it raised a lot of alarms within the tech community. But Dan Miller says that’s overblown. He’s lead analyst with the firm Opus Research and he follows voice technology. Miller explains there are good procedures and technology in place to prevent fraud. He says outside the lab, banks he’s worked with can reduce that false acceptance rate to less than 2 percent.

“There is always a view that you can defeat these things and indeed you can,” says Miller. “But the safeguards against them being defeated are developing as rapidly as the methods to defeat them.”

Miller says every type of password has vulnerabilities. That’s why security experts recommend multi-factor identification where you need more than just one type of password to access something.

UAB’s Maliheh Shirvanian says the study from 2015 tested speech algorithms. They expect to release a new study in the coming months that tests actual apps which use speech recognition. It’ll be a measure of how quickly the technology is advancing, both to fake voices and to fight the fakes.

 

United Nations nuclear agency again condemns Iran for failing to fully cooperate

The resolution comes after the agency said Iran has defied demands to rein in its nuclear program and has increased its stockpile of uranium enriched to near weapons-grade levels.

Alabama carries out nation’s 3rd nitrogen gas execution

An Alabama man convicted in the 1994 killing of a hitchhiker cursed at the prison warden shortly before he was put to death Thursday evening in the nation's third execution using nitrogen gas.

Trump names former Florida AG Pam Bondi as his new pick for U.S. attorney general

After former Rep. Matt Gaetz withdrew from consideration, President-elect Donald Trump named Pam Bondi, a former attorney general of Florida, as his next pick for U.S. attorney general.

Police report gives details, timeline of the sexual assault claim against Pete Hegseth

The woman who accused then-Fox News host of sexual assault in 2017 said that she "remembered saying 'no' a lot," according to a police report. Hegseth is President-elect Donald Trump's choice for Secretary of Defense.

Alabama Black Belt’s sewer crisis a tougher fix for residents in manufactured homes

Poor sanitation has long plagued residents in Alabama’s Black Belt. For people with manufactured houses, finding a solution has been more challenging.

In Birmingham, Black men’s groups work to save young men from the cycle of gun violence

As the city inches closer to its homicide record, community members are trying to address a sense of fatalism and lack of opportunity felt by some young men.

More Front Page Coverage