Skip to main content

Synthesis Attack

  • Reference work entry
Encyclopedia of Biometrics
  • 40 Accesses

Synthesis attack is similar to replay attack in that it also involves the recording of voice samples from a legitimate client. However, these samples are used to build a model of the client’s voice, which can in turn be used by a text-to-speech synthesizer to produce speech that is similar to the voice of the client. The text-to-speech synthesizer could then be controlled by an attacker, for example, by using the keyboard of a notebook computer, to produce any words or sentences that may be requested by the authentication system in the client’s voice in order to achieve false authentication.

Liveness Assurance in Face Authentication

Liveness Assurance in Voice Authentication

Security and Liveness, Overview

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this entry

Cite this entry

(2009). Synthesis Attack. In: Li, S.Z., Jain, A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_914

Download citation

Publish with us

Policies and ethics