Using Inaudible Audio and Voice Assistants to Transmit Sensitive Data over Telephony.
Zhengxian HeMohit Narayan RajputMustaque AhamadPublished in: CoRR (2020)
Keyphrases
- sensitive data
- emotion recognition
- privacy preserving
- data storage
- smart card
- text to speech
- security concerns
- information security
- multimedia
- data sharing
- data confidentiality
- protection mechanisms
- privacy preservation
- third party
- confidential data
- sensitive information
- data privacy
- malicious users
- privacy protection
- personal data
- security threats
- voice over internet protocol
- databases
- unauthorized access
- data analysis
- query processing
- intrusion detection