[go: up one dir, main page]

Phipps et al., 2020 - Google Patents

Enhancing cyber security using audio techniques: a public key infrastructure for sound

Phipps et al., 2020

View PDF
Document ID
11023163384578307050
Author
Phipps A
Ouazzane K
Vassilev V
Publication year
Publication venue
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

External Links

Snippet

This paper details the research into using audio signal processing methods to provide authentication and identification services for the purpose of enhancing cyber security in voice applications. Audio is a growing domain for cyber security technology. It is envisaged …
Continue reading at repository.londonmet.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Shirvanian et al. Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones
Pathak et al. Privacy-preserving speaker verification and identification using gaussian mixture models
KR101201151B1 (en) User authentication by combining speaker verification and reverse turing test
JP6594349B2 (en) Method and apparatus for identifying or authenticating humans and / or objects with dynamic acoustic security information
Esposito et al. Alexa versus alexa: Controlling smart speakers by self-issuing voice commands
Vaidya et al. You talk too much: Limiting privacy exposure via voice input
Anand et al. Keyboard emanations in remote voice calls: Password leakage and noise (less) masking defenses
US20190213306A1 (en) System and method for identity authentication
US9882719B2 (en) Methods and systems for multi-factor authentication
Anniappa et al. Security and privacy issues with virtual private voice assistants
Li et al. A survey on amazon alexa attack surfaces
US11676610B2 (en) Acoustic signatures for voice-enabled computer systems
Shirvanian et al. On the security and usability of crypto phones
Phipps et al. Securing voice communications using audio steganography
Chang et al. My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants
Ze et al. Ultrabd: Backdoor attack against automatic speaker verification systems via adversarial ultrasound
Zhang et al. Volere: Leakage resilient user authentication based on personal voice challenges
Alattar et al. Privacy‐preserving hands‐free voice authentication leveraging edge technology
Zhang et al. Livoauth: Liveness detection in voiceprint authentication with random challenges and detection modes
Shrestha et al. Sound-based two-factor authentication: Vulnerabilities and redesign
Phipps et al. Enhancing cyber security using audio techniques: a public key infrastructure for sound
Meng et al. Privacy-preserving liveness detection for securing smart voice interfaces
Anand et al. Coresident evil: Noisy vibrational pairing in the face of co-located acoustic eavesdropping
Phipps et al. Your password is music to my ears: Cloud based authentication using sound
Shirvanian et al. Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines