Skip to content
GTC

GTC

All Information about Technology

Menu
  • Gadgets
  • Network
  • Programming
  • Software
  • Technology News
Menu
Deepfake Software Fools Voice Authentication With 99% Success Rate

Deepfake Software Fools Voice Authentication With 99% Success Rate

Posted on 01/07/2023 by

Computer scientists at the University of Waterloo figured out how to successfully fool voice authentication systems 99% of the time(Opens in a new window) using deepfake voice creation software.

Andre Kassis, a Computer Security and Privacy PhD candidate at Waterloo, who is also the lead author of this research study, explains how voice authentication works:

“When enrolling in voice authentication, you are asked to repeat a certain phrase in your own voice. The system then extracts a unique vocal signature (voiceprint) from this provided phrase and stores it on a server … For future authentication attempts, you are asked to repeat a different phrase and the features extracted from it are compared to the voiceprint you have saved in the system to determine whether access should be granted.”

The team at Waterloo beat the authentication by using machine learning-enabled deepfake software to generate a copy of a voice. All the software needs is five minutes of recorded voice audio from which to learn to be a convincing fake. Even spoofing countermeasures employed by the voice authentication systems don’t flag the fake voice because a program written by the team removes markers from the deepfake audio that “betray it is computer-generated.”

Fake voices fooling voice authentication is something hackers were doing back at Black Hat in 2018, but the success rate of this latest method is sure to raise a lot of concern for any services relying on it for security.

Recommended by Our Editors

With just six attempts, the Waterloo research team managed a 99% success rate. The success rate does vary, though, based on the voice authentication system being targeted. However, Kassis says that the spoofing countermeasures employed today by these systems is, “critically flawed.”

The ease with which voice authentication can be fooled has led to Waterloo computer science professor Urs Hengartner stating, “we hope that companies relying on voice authentication as their only authentication factor will consider deploying additional or stronger authentication measures.”

PCMag Logo What Is Two-Factor Authentication?

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Experience layoffs current high-flying sector not immune from slowdown
  • Offline and On-line Integrations technique for increased ROI
  • Canada’s Rogers Communications suffers outage affecting 1000’s and 1000’s for lots of the day
  • CERT-In, Koo and CyberPeace Foundation Launch a Yr-long CyberSecurity Consciousness Advertising and marketing marketing campaign for School college students on sixth July 2022
  • Stunning demise shocks Dallas Cowboys, Texas Rangers radio
  • Contact Us
  • Disclosure Policy
  • Sitemap

computer software computer software devices howard beale assassination how can i see what devices are connected to my network? how does software work with hardware network network (1976) network 1976 poster network app network cast network computer network definition network film review network for good network imdb networking definition and examples network marketing network monologue network movie network remake network solutions network speed test network summary network switch network wiki oscars for network software software's software components of a computer software engineer software examples software is or are software meaning software notes software parts of computer software resources wikipedia software update the network the network cast the network summary types of software types of software components uses of software what is software where was network filmed

©2025 GTC | Built using WordPress and Responsive Blogily theme by Superb

WhatsApp us