Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

A Survey of Threats Against Voice Authentication and Anti-Spoofing Systems

Created by
  • Haebom

Author

Kamel Kamel, Keshav Sood, Hridoy Sankar Dutta, Sunil Aryal

Outline

This paper presents a comprehensive review of the emerging threat landscape targeting voice authentication systems (VAS) and anti-spoofing countermeasures (CMs). It traces the significant shift in voice authentication from traditional systems relying on handcrafted acoustic features to deep learning models capable of extracting robust speaker embeddings. It addresses a variety of attack types, including data poisoning, adversarial attacks, deepfakes, and adversarial spoofing attacks. For each attack type, it summarizes methodologies, highlights commonly used datasets, compares performance and limitations, and organizes the existing literature using a widely accepted taxonomy. By highlighting emerging risks and unresolved challenges, it aims to support the development of more secure and resilient voice authentication systems.

Takeaways, Limitations

Takeaways:
Provides a comprehensive understanding of the various threat types that have evolved alongside the evolution of voice authentication systems.
We present a systematic analysis of the methodology, dataset, performance, and limitations for each attack type.
It provides guidance for developing a more secure and resilient voice authentication system.
It helps us understand research trends on the latest threats and suggest future research directions.
Limitations:
This paper is a survey paper that comprehensively analyzes the results of existing research and does not include independent research results on new attack or defense techniques.
Because research into emerging threats is ongoing, the information contained in this paper may not always reflect the most current state of the art.
Detailed technical analysis of various attack types and defense techniques may be lacking.
👍