Voice impersonators can fool speaker recognition systems

Skilful voice impersonators are able to fool state-of-the-art speaker recognition systems, as these systems generally aren't efficient in recognising voice modifications, according to new research from the University of Eastern ...

Wearables to boost security of voice-based log-in

A security-token necklace, ear buds or eyeglasses developed at the University of Michigan could eliminate vulnerabilities in voice authentication—the practice of logging in to a device or service with your voice alone.

Gadgets: Smart sweeper maps territory to clean

Once you prepare your house for vacuuming, the only thing left to do to clean your floors and carpet is to press a button. From there, the Deebot R95 robotic vacuum cleaner takes over and does the work.

Protecting your smartphone from voice impersonators

It's a lot easier to talk to a smartphone than to try to type instructions on its keyboard. This is particularly true when a person is trying to log in to a device or a system: Few people would choose to type a long, complex ...

page 14 from 40