Phipps et al., 2020 - Google Patents
Enhancing cyber security using audio techniques: a public key infrastructure for soundPhipps et al., 2020
View PDF- Document ID
- 11023163384578307050
- Author
- Phipps A
- Ouazzane K
- Vassilev V
- Publication year
- Publication venue
- 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
External Links
Snippet
This paper details the research into using audio signal processing methods to provide authentication and identification services for the purpose of enhancing cyber security in voice applications. Audio is a growing domain for cyber security technology. It is envisaged …
- 230000002708 enhancing 0 title abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shirvanian et al. | Wiretapping via mimicry: Short voice imitation man-in-the-middle attacks on crypto phones | |
Pathak et al. | Privacy-preserving speaker verification and identification using gaussian mixture models | |
KR101201151B1 (en) | User authentication by combining speaker verification and reverse turing test | |
JP6594349B2 (en) | Method and apparatus for identifying or authenticating humans and / or objects with dynamic acoustic security information | |
Esposito et al. | Alexa versus alexa: Controlling smart speakers by self-issuing voice commands | |
Vaidya et al. | You talk too much: Limiting privacy exposure via voice input | |
Anand et al. | Keyboard emanations in remote voice calls: Password leakage and noise (less) masking defenses | |
US20190213306A1 (en) | System and method for identity authentication | |
US9882719B2 (en) | Methods and systems for multi-factor authentication | |
Anniappa et al. | Security and privacy issues with virtual private voice assistants | |
Li et al. | A survey on amazon alexa attack surfaces | |
US11676610B2 (en) | Acoustic signatures for voice-enabled computer systems | |
Shirvanian et al. | On the security and usability of crypto phones | |
Phipps et al. | Securing voice communications using audio steganography | |
Chang et al. | My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants | |
Ze et al. | Ultrabd: Backdoor attack against automatic speaker verification systems via adversarial ultrasound | |
Zhang et al. | Volere: Leakage resilient user authentication based on personal voice challenges | |
Alattar et al. | Privacy‐preserving hands‐free voice authentication leveraging edge technology | |
Zhang et al. | Livoauth: Liveness detection in voiceprint authentication with random challenges and detection modes | |
Shrestha et al. | Sound-based two-factor authentication: Vulnerabilities and redesign | |
Phipps et al. | Enhancing cyber security using audio techniques: a public key infrastructure for sound | |
Meng et al. | Privacy-preserving liveness detection for securing smart voice interfaces | |
Anand et al. | Coresident evil: Noisy vibrational pairing in the face of co-located acoustic eavesdropping | |
Phipps et al. | Your password is music to my ears: Cloud based authentication using sound | |
Shirvanian et al. | Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines |