UAB Research Finds Security Risks with Computer Created Voices

 ========= Old Image Removed =========Array
(
    [_wp_attached_file] => Array
        (
            [0] => 2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png
        )

    [_wp_attachment_metadata] => Array
        (
            [0] => a:5:{s:5:"width";i:640;s:6:"height";i:342;s:4:"file";s:81:"2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png";s:5:"sizes";a:10:{s:6:"medium";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-336x180.png";s:5:"width";i:336;s:6:"height";i:180;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-140x140.png";s:5:"width";i:140;s:6:"height";i:140;s:9:"mime-type";s:9:"image/png";}s:9:"wbhm-icon";a:4:{s:4:"file";s:79:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-80x80.png";s:5:"width";i:80;s:6:"height";i:80;s:9:"mime-type";s:9:"image/png";}s:13:"wbhm-featured";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x338.png";s:5:"width";i:600;s:6:"height";i:338;s:9:"mime-type";s:9:"image/png";}s:20:"wbhm-featured-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:18:"wbhm-featured-home";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-582x311.png";s:5:"width";i:582;s:6:"height";i:311;s:9:"mime-type";s:9:"image/png";}s:22:"wbhm-featured-carousel";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-470x251.png";s:5:"width";i:470;s:6:"height";i:251;s:9:"mime-type";s:9:"image/png";}s:28:"ab-block-post-grid-landscape";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:25:"ab-block-post-grid-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-125x125.png";s:5:"width";i:125;s:6:"height";i:125;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}
        )

)
1657038086 
1497345881

What if someone could take a recording of your voice and use it to create a digital version? In other words, he or she could use a computer to make it sound like you’re saying anything. A few weeks ago, the Canadian startup Lyrebird released a computer-generated conversation between some familiar voices.

It’s not the most natural-sounding, but you can probably tell the voices mimic Presidents Donald Trump, Barack Obama, and former Secretary of State Hilary Clinton. The technology has applications beyond parlor tricks. It’s also raising security concerns. That’s because we use our voices to identify ourselves.

Digital assistants such as Apple’s Siri or Amazon’s Alexa are designed to recognize a specific voice. Otherwise anyone shouting “Hey, Siri” could unlock any phone. Beyond that, some banks are now using voice recognition software to allow customers to access financial information by phone. Your voice essentially becomes a password.

But perhaps it’s not a very good password if software can now mimic your voice. Think about how many voices could be collected from YouTube videos or surreptitiously recorded with a smart phone.

So a team with UAB’s SPIES research group, which looks at emerging security and privacy issues, tackled a key question: is this type of security vulnerable to impersonation?

The study looked at two things. First, would a computer recognize and thus reject the fake voice? Turns out, according to this study, the synthesized voice fooled the computer more than 80 percent of the time.

“It’s not secure at all,” says Maliheh Shirvanian, who was part of the research team.

The second part of the study tested humans. Could they tell the difference between a real and fake voice? Test subjects listened to clips of Morgan Freeman and one like this.

Or maybe this…

That’s a fake Oprah Winfrey followed by her real voice.

People got it right only about half the time. Better than the computer but still no better than chance.

When this study came out in 2015, it raised a lot of alarms within the tech community. But Dan Miller says that’s overblown. He’s lead analyst with the firm Opus Research and he follows voice technology. Miller explains there are good procedures and technology in place to prevent fraud. He says outside the lab, banks he’s worked with can reduce that false acceptance rate to less than 2 percent.

“There is always a view that you can defeat these things and indeed you can,” says Miller. “But the safeguards against them being defeated are developing as rapidly as the methods to defeat them.”

Miller says every type of password has vulnerabilities. That’s why security experts recommend multi-factor identification where you need more than just one type of password to access something.

UAB’s Maliheh Shirvanian says the study from 2015 tested speech algorithms. They expect to release a new study in the coming months that tests actual apps which use speech recognition. It’ll be a measure of how quickly the technology is advancing, both to fake voices and to fight the fakes.

 

Mariska Hargitay walks a fine line in ‘My Mom Jayne’

It's natural to feel some skepticism when a celebrity makes a documentary about their own family. But Law & Order star Mariska Hargitay' tells a story that is both effective and empathetic.

Ukraine says it struck a Russian airbase as Russia sent drones into Ukraine

Ukraine said it struck a Russian airbase on Saturday, while Russia continued to pound Ukraine with hundreds of drones overnight, dashing hopes for a breakthrough in efforts to end the war.

‘Buy now, pay later’ purchases can now affect your credit score. Here’s what that means

Services that split up payments into installments are increasingly popular, especially among young and low-to-middle income shoppers. But now the FICO credit scoring company will be tracking that debt.

Will Trump’s megabill help Democrats win the House?

Democrats feel that Trump's tax and spending bill gives them an opening ahead of the 2026 midterms. But if they want to win back the House, they're going to have to get their own house in order first.

At least 24 dead in extreme Texas flooding. Several people remain missing

At least 24 people are dead following extreme flooding that slammed Texas Hill Country overnight on Friday, according to officials. At least 20 girls from a summer camp remain missing.

Trump says ceasefire deal is near as Israeli strikes kill 138 Palestinians in Gaza

More than 60 of those killed were waiting for aid, according to Palestinian health officials. President Trump said Friday that talks over a ceasefire between Israel and Hamas are at a crucial stage.

More Front Page Coverage