Baidu's Deep Voice can clone speech with less than four seconds of training

Tom Allen
clock • 2 min read

The software has dramatic implications for voice biometrics

With only a few seconds of audio, the ‘Deep Voice' software developed by China's Baidu is able to clone a human voice - raising fears about the security of biometrics. Baidu has been working on ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
ICO orders Serco Leisure to stop biometric monitoring of staff

Privacy

'Prioritising business interests over its employees’ privacy'

clock 23 February 2024 • 3 min read
UK's biometrics commissioners steps down, signalling missteps

Security Technology

Home Office is ignoring new technologies

clock 31 January 2024 • 4 min read
Data breach affects nearly 7 million 23andMe profiles

Hacking

Data including family trees and birth years have been stolen

clock 05 December 2023 • 2 min read

More on Threats and Risks

UK sanctions China-based hackers

UK sanctions China-based hackers

Attackers were targeting voters and politicians

clock 28 March 2024 • 3 min read
Russian cyber spies target German politicians in sophisticated phishing attack

Russian cyber spies target German politicians in sophisticated phishing attack

Germany's cyber agency BSI warned that state-backed hackers aimed to establish long-term access to German political networks

clock 25 March 2024 • 3 min read
Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read