Skip to main content

Showing 1–2 of 2 results for author: Kamel, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2509.07677  [pdf, ps, other

    cs.SD cs.AI

    Spectral Masking and Interpolation Attack (SMIA): A Black-box Adversarial Attack against Voice Authentication and Anti-Spoofing Systems

    Authors: Kamel Kamel, Hridoy Sankar Dutta, Keshav Sood, Sunil Aryal

    Abstract: Voice Authentication Systems (VAS) use unique vocal characteristics for verification. They are increasingly integrated into high-security sectors such as banking and healthcare. Despite their improvements using deep learning, they face severe vulnerabilities from sophisticated threats like deepfakes and adversarial attacks. The emergence of realistic voice cloning complicates detection, as systems… ▽ More

    Submitted 9 September, 2025; originally announced September 2025.

  2. arXiv:2508.16843  [pdf, ps, other

    cs.CR cs.AI

    A Survey of Threats Against Voice Authentication and Anti-Spoofing Systems

    Authors: Kamel Kamel, Keshav Sood, Hridoy Sankar Dutta, Sunil Aryal

    Abstract: Voice authentication has undergone significant changes from traditional systems that relied on handcrafted acoustic features to deep learning models that can extract robust speaker embeddings. This advancement has expanded its applications across finance, smart devices, law enforcement, and beyond. However, as adoption has grown, so have the threats. This survey presents a comprehensive review of… ▽ More

    Submitted 16 September, 2025; v1 submitted 22 August, 2025; originally announced August 2025.

    Comments: This paper is submitted to the IEEE IoT Journal