Synthesis attack is similar to replay attack in that it also involves the recording of voice samples from a legitimate client. However, these samples are used to build a model of the client’s voice, which can in turn be used by a text-to-speech synthesizer to produce speech that is similar to the voice of the client. The text-to-speech synthesizer could then be controlled by an attacker, for example, by using the keyboard of a notebook computer, to produce any words or sentences that may be requested by the authentication system in the client’s voice in order to achieve false authentication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this entry
Cite this entry
(2009). Synthesis Attack. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_914
Download citation
DOI: https://doi.org/10.1007/978-0-387-73003-5_914
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73002-8
Online ISBN: 978-0-387-73003-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering