Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

A Survey of Threats Against Voice Authentication and Anti-Spoofing Systems

Created by
  • Haebom

Author

Kamel Kamel, Keshav Sood, Hridoy Sankar Dutta, Sunil Aryal

Outline

This paper presents a comprehensive review of the emerging threat landscape targeting voice authentication systems (VAS) and anti-spoofing countermeasures (CMs). Voice authentication has advanced significantly, from traditional systems relying on handcrafted acoustic features to deep learning models capable of extracting robust speaker embeddings. However, this increased adoption has also led to a rise in threats. This paper chronologically traces the evolution of voice authentication and examines how vulnerabilities have evolved alongside technological advancements. For each attack type, we summarize methodologies, highlight commonly used datasets, compare performance and limitations, and organize the existing literature using a widely accepted taxonomy. By highlighting emerging risks and unresolved challenges, we aim to support the development of more secure and resilient voice authentication systems. Attack types covered include data poisoning, adversarial attacks, deepfakes, and adversarial spoofing attacks.

Takeaways, Limitations

Takeaways: Provides a comprehensive analysis of the latest threat landscape for voice authentication systems, contributing to the development of more secure and robust systems. It comprehensively presents methodologies, datasets, and performance comparisons for various attack types, providing valuable information for researchers and developers.
Limitations: This paper focuses on a comprehensive review of existing research, so its content may quickly become outdated as new attack techniques or defense technologies emerge. Furthermore, it is difficult to fully encompass all relevant research. Rather than providing an in-depth analysis of specific attack types or defense technologies, it focuses on providing a broad overview.
👍