Using an off - the - shelf voice - morphing tool, the researchers developed a voice impersonation attack to attempt to penetrate automated and human verification systems.
Described in a study to be presented this week in Atlanta at the 37th International Conference on Distributed Computing Systems, a prototype proved highly accurate in stopping machine - based voice impersonation attacks.
A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING.