Andrey Ivanov, Stepan A. Primak, Viktor A. Mazurenko
{"title":"Study of approaches to the synthesis and detection of cloned voices (DeepFake)","authors":"Andrey Ivanov, Stepan A. Primak, Viktor A. Mazurenko","doi":"10.17212/2782-2230-2022-3-62-80","DOIUrl":null,"url":null,"abstract":"Modern methods of protecting personal information often uses the voice biometric data of the owner of the information to identify the user. When the owner of the information voices the passphrase, he confirms his identity. However, attackers take advantage of the imperfection of such systems and develop methods for voice cloning, to create a twinkly voice for a cyberattack on personal data protection systems. Within the framework of this article, an attempt is made to explore existing methods for detecting cloned voices in order to protect information and counteract cyberattacks. Also, to achieve results, detection systems will be tested on a sample of Russian-language voice recordings taken from open sources. A comparative assessment of existing approaches is carried out in terms of their practical applicability. In particular, the requirements for the occupied memory of a computing device, computational complexity, complexity in implementation and data collection for training were taken into account. In addition, an analysis of the existing prerequisites and trends for the use of voice synthesis and substitution systems was carried out, potential risks were described, and examples of possible damage from the theft of biometric data were given. An attempt was also made to describe the experimental procedure for evaluating the performance of the considered methods with specifying and clarifying conditions. The criteria for verification and validation of the results are set, which allow drawing conclusions about the efficiency of the systems.","PeriodicalId":207311,"journal":{"name":"Digital Technology Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Technology Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17212/2782-2230-2022-3-62-80","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Modern methods of protecting personal information often uses the voice biometric data of the owner of the information to identify the user. When the owner of the information voices the passphrase, he confirms his identity. However, attackers take advantage of the imperfection of such systems and develop methods for voice cloning, to create a twinkly voice for a cyberattack on personal data protection systems. Within the framework of this article, an attempt is made to explore existing methods for detecting cloned voices in order to protect information and counteract cyberattacks. Also, to achieve results, detection systems will be tested on a sample of Russian-language voice recordings taken from open sources. A comparative assessment of existing approaches is carried out in terms of their practical applicability. In particular, the requirements for the occupied memory of a computing device, computational complexity, complexity in implementation and data collection for training were taken into account. In addition, an analysis of the existing prerequisites and trends for the use of voice synthesis and substitution systems was carried out, potential risks were described, and examples of possible damage from the theft of biometric data were given. An attempt was also made to describe the experimental procedure for evaluating the performance of the considered methods with specifying and clarifying conditions. The criteria for verification and validation of the results are set, which allow drawing conclusions about the efficiency of the systems.