Pipe Overflow: Smashing Voice Authentication for Fun and Profit.
Shimaa AhmedYash WaniAli Shahin ShamsabadiMohammad YaghiniIlia ShumailovNicolas PapernotKassem FawazPublished in: CoRR (2022)
Keyphrases
- decision making
- cross section
- security mechanisms
- user authentication
- fragile watermarking
- authentication scheme
- computer games
- identity authentication
- biometric authentication
- cross selling
- text to speech
- return on investment
- key distribution
- semi fragile watermarking
- marketing strategies
- authentication mechanism
- voice and data services
- public key