FB pixel

Researchers using wearables to increase voice authentication security

 

Researchers at the University of Michigan have developed new technique that allows wearables — such as a security-token necklace, ear buds or eyeglasses — to be used to eliminate vulnerabilities in voice authentication, according to a report by Phys.org.

Researchers call sound an “open channel” that can be easily duplicated by novice impersonators and skilled hackers alike.

“Increasingly, voice is being used as a security feature but it actually has huge holes in it,” said Kang Shin, the Kevin and Nancy O’Connor Professor of Computer Science and professor of electrical engineering and computer science at the University of Michigan. “If a system is using only your voice signature, it can be very dangerous. We believe you have to have a second channel to authenticate the owner of the voice.”

Shin and his colleagues have developed a solution called VAuth (pronounced vee-auth), which is a wearable device that can take the form of a necklace, ear buds or a small attachment to eyeglasses.

By continuously registering speech-induced vibrations on the user’s body, security-token necklace, ear buds or eyeglasses pairs the vibrations with the sound of the individual’s voice to generate a completely unique and secure signature.

When people speak, their vibrations can be detected on the skin of their face, throat or chest.

The system takes advantage of the instantaneous consistency between signals from the accelerometer in the wearable security token and the microphone in the electronic device.

The solution allows people to only use voice authentication with their device when they are wearing the security token.

The researchers have developed a prototype using an off-the-shelf accelerometer, which measures motion, and a Bluetooth transmitter, which delivers the vibration signal to the microphone in the user’s device. In addition, they have created matching algorithms and software for Google Now.

“VAuth is the first serious attempt to secure this service, ensuring that your voice assistant will only listen to your commands instead of others,” Shin said. “It delivers physical security, which is difficult to compromise even by sophisticated attackers. Only with this guarantee can the voice assistant be trusted as personal and secure, especially in scenarios such as banking and home safety.”

This procedure is completely different from current voice biometric mechanisms, which require each person to be trained on the device in order to use them, said Kassem Fawaz, who previously worked on the project as a graduate student at the University of Michigan.

“In addition, VAuth overcomes a key problem of voice biometrics,” Fawaz said. “A voice biometric, similar to a fingerprint, is not easy to keep protected. From a few recordings of the user’s voice, an attacker can impersonate the user by generating a matching voiceprint. The users can do little to regain their security as they cannot simply change their voice. On the other hand, when losing VAuth for any reason, the user can simply unpair it to prevent an attacker from using their device.”

Upon being tested with 18 users and 30 voice commands, VAuth achieved a 97 percent detection accuracy and less than 0.1 percent false positive rate, regardless of where it was placed on the body and the user’s language, accent or even mobility.

The team said the solution also prevents a range of practical attacks, such as replay attacks, mangled voice attacks or impersonation attacks.

The researchers also conducted a survey of 952 people to determine their willingness to wear a security token.

“Seventy percent of them said they are willing to give VAuth a serious try in one of the three configurations we developed—and half of them said they are willing to pay $25 more for the technology,” said Huan Feng, who worked on the project as a graduate student and currently works for Facebook.

The team will present the study on VAuth, titled “Continuous Authentication for Voice Assistants,” on October 19 at the International Conference on Mobile Computing and Networking, MobiCom 2017, in Snowbird, Utah.

Article Topics

 |   |   | 

Latest Biometrics News

 

Face biometrics use cases outnumbered only by important considerations

With face biometrics now used regularly in many different sectors and areas of life, stakeholders are asking questions about a…

 

Biometric Update Podcast explores identification at scale using browser fingerprinting

“Browser fingerprinting is this idea that modern browsers are so complex.” So says Valentin Vasilyev, Chief Technology Officer of Fingerprint,…

 

Passkeys now pervasive but passwords persist in enterprise authentication

Passkeys are here; now about those passwords. Specifically, passkeys are now prevalent in the enterprise, the FIDO Alliance says, with…

 

Pornhub returns to UK, but only for iOS users who verify age with Apple

In the UK, “wanker” is not typically a term of endearment. However, the case may be different for Pornhub, which…

 

Europol operated ‘shadow’ IT systems without data safeguards: Report

Europol has operated secret data analysis platforms containing large amounts of personal information, such as identity documents, without the security…

 

EU pushes AI Act deadlines for high-risk systems, including biometrics

The EU has reached a provisional agreement on changes to the AI Act that postpone rules on high-risk AI systems,…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis and Buyer's Guides

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events