scholarly journals User Authentication Method via Speaker Recognition and Speech Synthesis Detection

2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Hyun Park ◽  
TaeGuen Kim

As the Internet has been developed, various online services such as social media services are introduced and widely used by many people. Traditionally, many online services utilize self-certification methods that are made using public certificates or resident registration numbers, but it is found that the existing methods pose the risk of recent personal information leakage accidents. The most popular authentication method to compensate for these problems is biometric authentication technology. The biometric authentication techniques are considered relatively safe from risks like personal information theft, forgery, etc. Among many biometric-based methods, we studied the speaker recognition method, which is considered suitable to be used as a user authentication method of the social media service usually accessed in the smartphone environment. In this paper, we first propose a speaker recognition-based authentication method that identifies and authenticates individual voice patterns, and we also present a synthesis speech detection method that is used to prevent a masquerading attack using synthetic voices.

2020 ◽  
Vol 28 (1) ◽  
pp. 189-203
Author(s):  
Feng Wang ◽  
Ge Bao Shan ◽  
Yong Chen ◽  
Xianrong Zheng ◽  
Hong Wang ◽  
...  

Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.


2020 ◽  
Vol 26 (1) ◽  
pp. 151-156
Author(s):  
Andrei Șandor

AbstractSince the emergence of Internet and social media, new Intelligence branches have flourished, like CYBERINT (Cyber Intelligence), OSINT (Open Source Intelligence) or SOCMINT (Social Media Intelligence), with the aim to exploit different dimensions of the virtual world. These Intelligence-related disciplines may inquire personal information, statements and conversations posted voluntarily on websites or social platforms in order to profile people, identify social networks and organizational structures, and uncover vulnerabilities and threats/risks that can jeopardize the security of individuals or organizations. In this respect, the Internet - as environment - can provide valuable information from both technical and social side. This is why the World Wide Web is and will remain an important place to search for data and information that can be processed into Intelligence, and represents the reason why people working in sensitive domains (e.g. Intelligence) should be aware of their vulnerabilities and the risks and threats posed by this environment.DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence.


2021 ◽  
Vol 13 (3) ◽  
pp. 80
Author(s):  
Lazaros Vrysis ◽  
Nikolaos Vryzas ◽  
Rigas Kotsakis ◽  
Theodora Saridou ◽  
Maria Matsiola ◽  
...  

Social media services make it possible for an increasing number of people to express their opinion publicly. In this context, large amounts of hateful comments are published daily. The PHARM project aims at monitoring and modeling hate speech against refugees and migrants in Greece, Italy, and Spain. In this direction, a web interface for the creation and the query of a multi-source database containing hate speech-related content is implemented and evaluated. The selected sources include Twitter, YouTube, and Facebook comments and posts, as well as comments and articles from a selected list of websites. The interface allows users to search in the existing database, scrape social media using keywords, annotate records through a dedicated platform and contribute new content to the database. Furthermore, the functionality for hate speech detection and sentiment analysis of texts is provided, making use of novel methods and machine learning models. The interface can be accessed online with a graphical user interface compatible with modern internet browsers. For the evaluation of the interface, a multifactor questionnaire was formulated, targeting to record the users’ opinions about the web interface and the corresponding functionality.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


2012 ◽  
Vol 9 (4) ◽  
pp. 378-393 ◽  
Author(s):  
Alice Marwick

People create profiles on social network sites and Twitter accounts against the background of an audience. This paper argues that closely examining content created by others and looking at one’s own content through other people’s eyes, a common part of social media use, should be framed as social surveillance. While social surveillance is distinguished from traditional surveillance along three axes (power, hierarchy, and reciprocity), its effects and behavior modification is common to traditional surveillance. Drawing on ethnographic studies of United States populations, I look at social surveillance, how it is practiced, and its impact on people who engage in it. I use Foucault’s concept of capillaries of power to demonstrate that social surveillance assumes the power differentials evident in everyday interactions rather than the hierarchical power relationships assumed in much of the surveillance literature. Social media involves a collapse of social contexts and social roles, complicating boundary work but facilitating social surveillance. Individuals strategically reveal, disclose and conceal personal information to create connections with others and tend social boundaries. These processes are normal parts of day-to-day life in communities that are highly connected through social media.


2015 ◽  
Vol 44 (1) ◽  
pp. 12-21 ◽  
Author(s):  
Andrea Copeland

Abstract This article explores the possibility that public libraries can be repositories for digital community archives. The overarching goal is to establish a case for public libraries’ developing digital community archives that are participatory and which emphasize born-digital items rather than digitized physical items. This discussion follows my own research and experience in this area to include personal information management, social media and the personal archive, and the accidental community archive, and demonstrates that public libraries can focus on communities’ current events and people rather than solely on those from the past.


Koneksi ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. 328
Author(s):  
Jovita Clarissa ◽  
H.H. Daniel Tamburian

Humans are social beings who need other individuals to group. In interacting with others, individuals will convey information and usually begin with an introduction relates to self disclosure, which is the type of individual communication disclosing information about himself is commonly concealed. Social media is a medium on the Internet that allows users to represent themselves, share, communicate with others and create virtual social ties. This research was intended to examine Instagram and Self Disclosure in an interpersonal communication perspective on the Santo Kristoforus II high school students to find out the activities of students on Instagram social media. Research based on Self-Disclosure theory, communication theory in the Digital Era, social media, and Instagram. Research uses a qualitative approach with case study methods. The results is that the self disclosure conducted by the informant is about daily activities, and the self disclosure is on Instagram involving several Self-Disclosure processes. In the process of Self-Disclosure, informants usually provide personal information such as feelings, thoughts and experiences, and they are also careful enough in uploading information to social mediaManusia disebut makhluk yang memerlukan seseorang untuk saling berhubungan timbal balik. Dalam berinteraksi dengan orang lain, individu akan menyampaikan berbagai informasi dan biasanya diawali dengan perkenalan mengenai dirinya, hal tersebut berkaitan dengan self disclosure, yakni jenis komunikasi individu mengungkapkan informasi tentang dirinya sendiri yang biasa disembunyikan. Media sosial saat ini digunakan penggunanya untuk berkomunikasi, membentuk relasi dengan orang lain secara virtual. Sehingga penelitian ini dimaksudkan untuk meneliti Instagram dan Self Disclosure dalam Perspektif Komunikasi Antarpribadi terhadap Siswa-Siswi SMA Santo Kristoforus II untuk mengetahui aktivitas siswa-siswi di media sosial Instagram. Penelitian berlandaskan teori Self-Disclosure, Teori Komunikasi di Era Digital, Media Sosial, dan Instagram. Penelitian menggunakan pendekatan kualitatif dengan metode studi kasus. Hasil penelitian menunjukkan bahwa pengungkapan diri yang dilakukan oleh informan berisi tentang aktivitas sehari-hari yang dilakukan, dan pengungkapan diri tersebut dilakukan dalam media sosial Instagram yang melibatkan beberapa proses pengungkapan diri. Dalam proses pengungkapan diri, informan biasanya memberikan informasi pribadi seperti perasaan, pikiran dan pengalaman. Dengan banyaknya informasi yang diberikan, tidak menutup kemungkinan mereka juga cukup berhati-hati dalam mengunggah informasi ke media sosial


2019 ◽  
Author(s):  
◽  
Youssef Ramzi Mansour

Big data is a relatively new concept that refers to the enormous amount of data generated in a new era where people are selling, buying, paying dues, managing their health and communicating over the internet. It becomes natural that generated data will be analyzed for the purposes of smart advertising and social statistical studies. Social data analytics is the concept of micro-studying users interactions through data obtained often from social networking services, the concept also known as “social mining” offers tremendous opportunities to support decision making through recommendation systems widely used by e-commerce mainly. With these new opportunities comes the problematic of social media users privacy concerns as protecting personal information over the internet has become a controversial issue among social network providers and users. In this study we identify and describe various privacy concerns and related platforms as well as the legal frameworks governing the protection of personal information in different jurisdictions. Furthermore we discuss the Facebook and Cambridge Analytica Ltd incident as an example.


Author(s):  
Neeraj Vashistha ◽  
Arkaitz Zubiaga

The exponential increase in the use of the Internet and social media over the last two decades has changed human interaction. This has led to many positive outcomes, but at the same time it has brought risks and harms. While the volume of harmful content online, such as hate speech, is not manageable by humans, interest in the academic community to investigate automated means for hate speech detection has increased. In this study, we analyse six publicly available datasets by combining them into a single homogeneous dataset and classify them into three classes, abusive, hateful or neither. We create a baseline model and we improve model performance scores using various optimisation techniques. After attaining a competitive performance score, we create a tool which identifies and scores a page with effective metric in near-real time and uses the same as feedback to re-train our model. We prove the competitive performance of our multilingual model on two langauges, English and Hindi, leading to comparable or superior performance to most monolingual models.


Sign in / Sign up

Export Citation Format

Share Document