In this presentation, Bhusan Chettri provides an overview of voice authentication system that is based on automatic speaker verification technology. He provides background on both the traditional approaches of modelling speakers and current deep learning based approaches. A brief introduction to how these systems can be manipulated is also provided.
In this article Dr. Bhusan Chettri provides an overview of how voice authentication systems can be compromised through spoofing attacks. He adds "spoofing attack refers to the process of making an un-authorised attempt to break into someone else's authentication system either using synthetic voices produces through AI technology or by performing a mimicry or by simply replaying a pre-recorded voice samples of the target user."