2MA: Verifying Voice Commands via Two Microphone Authentication.
Logan BlueHadi AbdullahLuis VargasPatrick TraynorPublished in: AsiaCCS (2018)
Keyphrases
- biometric authentication
- authentication scheme
- model checking
- identity authentication
- automatic speech recognition
- visual information
- fragile watermarking
- voice and data services
- text to speech
- security requirements
- authentication mechanism
- speaker diarization
- voice activity detection
- integrity verification
- voice recognition
- data encryption
- neural network
- user authentication
- sound source
- digital watermarking
- security analysis