UAB Research Finds Security Risks with Computer Created Voices

 ========= Old Image Removed =========Array
(
    [_wp_attached_file] => Array
        (
            [0] => 2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png
        )

    [_wp_attachment_metadata] => Array
        (
            [0] => a:5:{s:5:"width";i:640;s:6:"height";i:342;s:4:"file";s:81:"2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png";s:5:"sizes";a:10:{s:6:"medium";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-336x180.png";s:5:"width";i:336;s:6:"height";i:180;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-140x140.png";s:5:"width";i:140;s:6:"height";i:140;s:9:"mime-type";s:9:"image/png";}s:9:"wbhm-icon";a:4:{s:4:"file";s:79:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-80x80.png";s:5:"width";i:80;s:6:"height";i:80;s:9:"mime-type";s:9:"image/png";}s:13:"wbhm-featured";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x338.png";s:5:"width";i:600;s:6:"height";i:338;s:9:"mime-type";s:9:"image/png";}s:20:"wbhm-featured-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:18:"wbhm-featured-home";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-582x311.png";s:5:"width";i:582;s:6:"height";i:311;s:9:"mime-type";s:9:"image/png";}s:22:"wbhm-featured-carousel";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-470x251.png";s:5:"width";i:470;s:6:"height";i:251;s:9:"mime-type";s:9:"image/png";}s:28:"ab-block-post-grid-landscape";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:25:"ab-block-post-grid-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-125x125.png";s:5:"width";i:125;s:6:"height";i:125;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}
        )

)
1666336051 
1497345881

What if someone could take a recording of your voice and use it to create a digital version? In other words, he or she could use a computer to make it sound like you’re saying anything. A few weeks ago, the Canadian startup Lyrebird released a computer-generated conversation between some familiar voices.

It’s not the most natural-sounding, but you can probably tell the voices mimic Presidents Donald Trump, Barack Obama, and former Secretary of State Hilary Clinton. The technology has applications beyond parlor tricks. It’s also raising security concerns. That’s because we use our voices to identify ourselves.

Digital assistants such as Apple’s Siri or Amazon’s Alexa are designed to recognize a specific voice. Otherwise anyone shouting “Hey, Siri” could unlock any phone. Beyond that, some banks are now using voice recognition software to allow customers to access financial information by phone. Your voice essentially becomes a password.

But perhaps it’s not a very good password if software can now mimic your voice. Think about how many voices could be collected from YouTube videos or surreptitiously recorded with a smart phone.

So a team with UAB’s SPIES research group, which looks at emerging security and privacy issues, tackled a key question: is this type of security vulnerable to impersonation?

The study looked at two things. First, would a computer recognize and thus reject the fake voice? Turns out, according to this study, the synthesized voice fooled the computer more than 80 percent of the time.

“It’s not secure at all,” says Maliheh Shirvanian, who was part of the research team.

The second part of the study tested humans. Could they tell the difference between a real and fake voice? Test subjects listened to clips of Morgan Freeman and one like this.

Or maybe this…

That’s a fake Oprah Winfrey followed by her real voice.

People got it right only about half the time. Better than the computer but still no better than chance.

When this study came out in 2015, it raised a lot of alarms within the tech community. But Dan Miller says that’s overblown. He’s lead analyst with the firm Opus Research and he follows voice technology. Miller explains there are good procedures and technology in place to prevent fraud. He says outside the lab, banks he’s worked with can reduce that false acceptance rate to less than 2 percent.

“There is always a view that you can defeat these things and indeed you can,” says Miller. “But the safeguards against them being defeated are developing as rapidly as the methods to defeat them.”

Miller says every type of password has vulnerabilities. That’s why security experts recommend multi-factor identification where you need more than just one type of password to access something.

UAB’s Maliheh Shirvanian says the study from 2015 tested speech algorithms. They expect to release a new study in the coming months that tests actual apps which use speech recognition. It’ll be a measure of how quickly the technology is advancing, both to fake voices and to fight the fakes.

 

American chess grandmaster Daniel Naroditsky dies at 29

The Charlotte Chess Center, where Naroditsky trained and worked as a coach, announced his death, calling him "a talented chess player, educator, and beloved member of the chess community."

The Dodgers want to win another World Series. The Toronto Blue Jays are in their way

The Los Angeles Dodgers have put all the chips in on their pursuit of being baseball's first back-to-back champions since 2000. The Blue Jays and their red-hot lineup won't go down easy.

The White House starts demolishing part of the East Wing to build Trump’s ballroom

Dramatic photos show construction equipment tearing into the East Wing façade and windows, though the federal agency that oversees such projects has not approved President Trump's 90,000-square-foot, $250 million ballroom.

Outage at Amazon Web Services disrupts websites across the internet

Amazon's cloud computing service provides back-end support to many companies that operate online. When it has problems, so do they.

Hollywood pushes OpenAI for consent

The latest version of OpenAI's Sora can quickly turn text prompts and simple images into studio quality videos, which left the entertainment industry deeply uneasy.

9th Circuit rules that National Guard can deploy to Portland

The appeals court overturned the ruling of a lower court judge in Oregon, and clears the way for President Trump to deploy the National Guard to Portland.

More Front Page Coverage