• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification


Chunho Hong, Youngho Cho, Journal of Internet Computing and Services, Vol. 22, No. 6, pp. 33-40, Dec. 2021
10.7472/jksii.2021.22.6.33, Full Text:
Keywords: Voice Recognition, AI Voice Recognition Speaker, Automatic speaker verification, Voice Conversion

Abstract

Automatic Speech Recognition(ASR) is a technology that analyzes human speech sound into speech signals and then automatically converts them into character strings that can be understandable by human. Speech recognition technology has evolved from the basic level of recognizing a single word to the advanced level of recognizing sentences consisting of multiple words. In real-time voice conversation, the high recognition rate improves the convenience of natural information delivery and expands the scope of voice-based applications. On the other hand, with the active application of speech recognition technology, concerns about related cyber attacks and threats are also increasing. According to the existing studies, researches on the technology development itself, such as the design of the Automatic Speaker Verification(ASV) technique and improvement of accuracy, are being actively conducted. However, there are not many analysis studies of attacks and threats in depth and variety. In this study, we propose a cyber attack model that bypasses voice authentication by simply manipulating voice frequency and voice speed for AI voice recognition service equipped with automated identification technology and analyze cyber threats by conducting extensive experiments on the automated identification system of commercial smartphones. Through this, we intend to inform the seriousness of the related cyber threats and raise interests in research on effective countermeasures.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Chunho Hong and Youngho Cho (2021). Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification. Journal of Internet Computing and Services, 22(6), 33-40. DOI: 10.7472/jksii.2021.22.6.33.

[IEEE Style]
C. Hong and Y. Cho, "Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification," Journal of Internet Computing and Services, vol. 22, no. 6, pp. 33-40, 2021. DOI: 10.7472/jksii.2021.22.6.33.

[ACM Style]
Chunho Hong and Youngho Cho. 2021. Cyber Threats Analysis of AI Voice Recognition-based Services with Automatic Speaker Verification. Journal of Internet Computing and Services, 22, 6, (2021), 33-40. DOI: 10.7472/jksii.2021.22.6.33.