Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image

被引:0
|
作者
Jiang, Nan [1 ]
Sun, Bangjie [1 ]
Sim, Terence [1 ]
Han, Jun [2 ]
机构
[1] Natl Univ Singapore, Singapore, Singapore
[2] Korea Adv Inst Sci & Technol, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present Foice, a novel deepfake attack against voice authentication systems. Foice generates a synthetic voice of the victim from just a single image of the victim's face, without requiring any voice sample. This synthetic voice is realistic enough to fool commercial authentication systems. Since face images are generally easier to obtain than voice samples, Foice effectively makes it easier for an attacker to mount large-scale attacks. The key idea lies in learning the partial correlation between face and voice features, and adding to that a face-independent voice feature sampled from a Gaussian distribution. We demonstrate the effectiveness of Foice with a comprehensive set of real-world experiments involving ten offline participants and an online dataset of 1,029 unique individuals. By evaluating eight state-of-the-art systems, including WeChat's Voiceprint and Microsoft Azure, we show that all these systems are vulnerable to Foice attack.
引用
收藏
页码:1045 / 1062
页数:18
相关论文
共 30 条
  • [1] Hear Your Face: Face-based voice conversion with F0 estimation
    Lee, Jaejun
    Oh, Yoori
    Hwang, Injune
    Lee, Kyogu
    INTERSPEECH 2024, 2024, : 4378 - 4382
  • [2] "I can't lie to your face": Minimal face-to-face interaction promotes honesty
    Van Zant, Alex B.
    Kray, Laura J.
    JOURNAL OF EXPERIMENTAL SOCIAL PSYCHOLOGY, 2014, 55 : 234 - 238
  • [3] What can I tell from your face?
    Grosso, E
    Tistarelli, M
    BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 109 - 116
  • [4] I can't recognize your face but I can recognize its movement
    Steede, Leslie L.
    Tree, Jeremy J.
    Hole, Graham J.
    COGNITIVE NEUROPSYCHOLOGY, 2007, 24 (04) : 451 - 466
  • [5] I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
    Kennedy, Sean
    Li, Haipeng
    Wang, Chenggang
    Liu, Hao
    Wang, Boyang
    Sun, Wenhai
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019, : 232 - 240
  • [6] I recognize your face, but I can't remember your name: A question of expertise?
    Rahman, RA
    Sommer, W
    Olada, E
    QUARTERLY JOURNAL OF EXPERIMENTAL PSYCHOLOGY SECTION A-HUMAN EXPERIMENTAL PSYCHOLOGY, 2004, 57 (05): : 819 - 834
  • [7] CAN YOU HEAR WHAT I SEE? NONVERBAL COMMUNICATION AND THE CHANGING FACE OF TML
    Richardson, Sandra M.
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2007, 20 : 972 - 995
  • [8] Multimodality for Reliable Single Image Based Face Morphing Attack Detection
    Raghavendra, Ramachandra
    Li, Guoqiang
    IEEE ACCESS, 2022, 10 : 82418 - 82433
  • [9] Single Image Face Morphing Attack Detection Using Ensemble of Features
    Venkatesh, Sushma
    Ramachandra, Raghavendra
    Raja, Kiran
    Busch, Christoph
    PROCEEDINGS OF 2020 23RD INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION 2020), 2020, : 1094 - 1099
  • [10] Can personalised hygienic masks be used to attack face recognition systems?
    Komaty, Alain
    Hahn, Vedrana Krivokuca
    Ecabert, Christophe
    Marcel, Sebastien
    2023 IEEE INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS, IJCB, 2023,