UAB Research Finds Security Risks with Computer Created Voices

 ========= Old Image Removed =========Array
(
    [_wp_attached_file] => Array
        (
            [0] => 2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png
        )

    [_wp_attachment_metadata] => Array
        (
            [0] => a:5:{s:5:"width";i:640;s:6:"height";i:342;s:4:"file";s:81:"2017/05/e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave.png";s:5:"sizes";a:10:{s:6:"medium";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-336x180.png";s:5:"width";i:336;s:6:"height";i:180;s:9:"mime-type";s:9:"image/png";}s:9:"thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-140x140.png";s:5:"width";i:140;s:6:"height";i:140;s:9:"mime-type";s:9:"image/png";}s:9:"wbhm-icon";a:4:{s:4:"file";s:79:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-80x80.png";s:5:"width";i:80;s:6:"height";i:80;s:9:"mime-type";s:9:"image/png";}s:13:"wbhm-featured";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x338.png";s:5:"width";i:600;s:6:"height";i:338;s:9:"mime-type";s:9:"image/png";}s:20:"wbhm-featured-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:18:"wbhm-featured-home";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-582x311.png";s:5:"width";i:582;s:6:"height";i:311;s:9:"mime-type";s:9:"image/png";}s:22:"wbhm-featured-carousel";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-470x251.png";s:5:"width";i:470;s:6:"height";i:251;s:9:"mime-type";s:9:"image/png";}s:28:"ab-block-post-grid-landscape";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:25:"ab-block-post-grid-square";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-600x342.png";s:5:"width";i:600;s:6:"height";i:342;s:9:"mime-type";s:9:"image/png";}s:14:"post-thumbnail";a:4:{s:4:"file";s:81:"e837b80c2af2033ecd0b470de7444e90fe76e6dc1fb0174392f2c6_640_sound-wave-125x125.png";s:5:"width";i:125;s:6:"height";i:125;s:9:"mime-type";s:9:"image/png";}}s:10:"image_meta";a:12:{s:8:"aperture";s:1:"0";s:6:"credit";s:0:"";s:6:"camera";s:0:"";s:7:"caption";s:0:"";s:17:"created_timestamp";s:1:"0";s:9:"copyright";s:0:"";s:12:"focal_length";s:1:"0";s:3:"iso";s:1:"0";s:13:"shutter_speed";s:1:"0";s:5:"title";s:0:"";s:11:"orientation";s:1:"0";s:8:"keywords";a:0:{}}}
        )

)
1643159560 
1497345881

What if someone could take a recording of your voice and use it to create a digital version? In other words, he or she could use a computer to make it sound like you’re saying anything. A few weeks ago, the Canadian startup Lyrebird released a computer-generated conversation between some familiar voices.

It’s not the most natural-sounding, but you can probably tell the voices mimic Presidents Donald Trump, Barack Obama, and former Secretary of State Hilary Clinton. The technology has applications beyond parlor tricks. It’s also raising security concerns. That’s because we use our voices to identify ourselves.

Digital assistants such as Apple’s Siri or Amazon’s Alexa are designed to recognize a specific voice. Otherwise anyone shouting “Hey, Siri” could unlock any phone. Beyond that, some banks are now using voice recognition software to allow customers to access financial information by phone. Your voice essentially becomes a password.

But perhaps it’s not a very good password if software can now mimic your voice. Think about how many voices could be collected from YouTube videos or surreptitiously recorded with a smart phone.

So a team with UAB’s SPIES research group, which looks at emerging security and privacy issues, tackled a key question: is this type of security vulnerable to impersonation?

The study looked at two things. First, would a computer recognize and thus reject the fake voice? Turns out, according to this study, the synthesized voice fooled the computer more than 80 percent of the time.

“It’s not secure at all,” says Maliheh Shirvanian, who was part of the research team.

The second part of the study tested humans. Could they tell the difference between a real and fake voice? Test subjects listened to clips of Morgan Freeman and one like this.

Or maybe this…

That’s a fake Oprah Winfrey followed by her real voice.

People got it right only about half the time. Better than the computer but still no better than chance.

When this study came out in 2015, it raised a lot of alarms within the tech community. But Dan Miller says that’s overblown. He’s lead analyst with the firm Opus Research and he follows voice technology. Miller explains there are good procedures and technology in place to prevent fraud. He says outside the lab, banks he’s worked with can reduce that false acceptance rate to less than 2 percent.

“There is always a view that you can defeat these things and indeed you can,” says Miller. “But the safeguards against them being defeated are developing as rapidly as the methods to defeat them.”

Miller says every type of password has vulnerabilities. That’s why security experts recommend multi-factor identification where you need more than just one type of password to access something.

UAB’s Maliheh Shirvanian says the study from 2015 tested speech algorithms. They expect to release a new study in the coming months that tests actual apps which use speech recognition. It’ll be a measure of how quickly the technology is advancing, both to fake voices and to fight the fakes.

 

In Las Vegas, Trump once again pitches no taxes on tips

President Trump's pitch to stop taxing tips is popular with everyone -- except for economists.

Exclusive: White House in talks to have Oracle and U.S. investors take over TikTok

The aim is to place oversight control in the hands of American software company Oracle and other investors. Under federal law, TikTok must split apart from China, or face a nationwide ban.

Madison Keys wins her first-ever Grand Slam title against two-time defending champion

Madison Keys was a tennis prodigy, beating Serena Williams when she was just 14 years old, but had not won a grand slam title in her 15 year career.

To ghost or not to ghost? We want to know about the dating experiences that haunt you

Whether you've been the "ghoster" or the "ghostee" — All Things Considered wants to hear about your ghosting experiences.

Trump uses mass firing to remove inspectors general at a series of agencies

The dismissals began Friday night, according to two people cited by The Associated Press. An email sent by one of the fired inspectors general said "roughly 17" inspectors general had been removed.

Senate confirms Kristi Noem as Trump’s Secretary of Homeland Security

Noem will be in charge of executing one of President Trump's biggest priorities in his second term: cracking down on immigration.

More Front Page Coverage