{"id":51741,"date":"2023-05-09T08:39:02","date_gmt":"2023-05-09T08:39:02","guid":{"rendered":"https:\/\/veridas.com\/?p=51741"},"modified":"2024-12-19T23:32:59","modified_gmt":"2024-12-19T23:32:59","slug":"can-deepfake-audio-detected","status":"publish","type":"post","link":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/","title":{"rendered":"Can deepfake audio be detected?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"51741\" class=\"elementor elementor-51741 elementor-51732\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0a52958 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a52958\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-065d998\" data-id=\"065d998\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d8997fa elementor-widget elementor-widget-text-editor\" data-id=\"d8997fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With the rise of <strong>deepfake audio<\/strong><\/span><span style=\"font-weight: 400;\">&nbsp;in recent years, people have become increasingly aware of the potential dangers of synthetic fraud and <a href=\"https:\/\/veridas.com\/what-is-vishing\/\">vishing attacks<\/a>: from fake news to impersonation attempts, deepfakes have made their way into mainstream conversations.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, in the world of digital identity, <a href=\"https:\/\/veridas.com\/voice-biometric-authentication\/\">voice biometric authentication<\/a> offers a secure and reliable solution, even in the presence of such attacks, especially when compared to traditional methods of authentication, such as passwords or question-based authentication.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Voice biometric authentication provides a more robust and user-friendly experience that is gaining traction in relevant industries such as the financial or insurance sectors. In this article, we will take a closer look at voice biometric authentication and explore how it can help protect your business against synthetic fraud.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3191ccf elementor-widget elementor-widget-html\" data-id=\"3191ccf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-2ca680a6-0bb4-428c-870a-2469899d7fd9\"><span class=\"hs-cta-node hs-cta-2ca680a6-0bb4-428c-870a-2469899d7fd9\" id=\"hs-cta-2ca680a6-0bb4-428c-870a-2469899d7fd9\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/2ca680a6-0bb4-428c-870a-2469899d7fd9\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-2ca680a6-0bb4-428c-870a-2469899d7fd9\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/2ca680a6-0bb4-428c-870a-2469899d7fd9.png\"  alt=\"Nueva llamada a la acci\u00f3n\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, '2ca680a6-0bb4-428c-870a-2469899d7fd9', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8b20765 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8b20765\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-161103f\" data-id=\"161103f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8045ae elementor-widget elementor-widget-heading\" data-id=\"e8045ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How does deepfake audio work?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e60db81 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e60db81\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70a88b2\" data-id=\"70a88b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e37201 elementor-widget elementor-widget-text-editor\" data-id=\"9e37201\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">AI-generated or synthetic voices are computer-generated voices that sound like real human voices. These voices are created using complex algorithms that analyze and replicate the characteristics of human speech, such as intonation, pitch, and timbre. Synthetic voices can be programmed to sound like specific individuals.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">These voices can be generated combining a variety of techniques, such as text-to-speech software, deep neural networks, and other forms of machine learning.<\/span><\/p><p><span style=\"font-weight: 400;\">Pre-recorded voices can also be used to carry out fraud. For example, a fraudster might record a person&#8217;s voice during a phone conversation and then use it to authenticate themselves as that person in a subsequent call. This is known as voice replay attack or voice cloning.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd443bb elementor-widget elementor-widget-image\" data-id=\"dd443bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/04\/Veridas-user-call-voice-recognition-1024x683.jpg\" class=\"attachment-large size-large wp-image-76386\" alt=\"\/can-deepfake-audio-detected\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/04\/Veridas-user-call-voice-recognition-1024x683.jpg 1024w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/04\/Veridas-user-call-voice-recognition-300x200.jpg 300w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/04\/Veridas-user-call-voice-recognition-768x512.jpg 768w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/04\/Veridas-user-call-voice-recognition-1536x1024.jpg 1536w, https:\/\/veridas.com\/wp-content\/uploads\/2024\/04\/Veridas-user-call-voice-recognition.jpg 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-af534cd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"af534cd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-23e9f3b\" data-id=\"23e9f3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6b5a85 elementor-widget elementor-widget-heading\" data-id=\"a6b5a85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is the voice clone fraud?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8471251 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8471251\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3601e23\" data-id=\"3601e23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a7abc7 elementor-widget elementor-widget-text-editor\" data-id=\"8a7abc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Voice clone fraud involves the unauthorized use of someone&#8217;s voice to deceive others for malicious purposes. This fraudulent practice typically employs advanced technologies such as deepfake or voice cloning algorithms to replicate a person&#8217;s voice with remarkable accuracy.\u00a0<\/p><p>Perpetrators may utilize these voice clones to impersonate individuals, such as public figures or acquaintances, in various scenarios, including phone calls, video conferences, or audio messages. The primary aim is often to manipulate, deceive, or defraud unsuspecting victims into divulging sensitive information, making financial transactions, or engaging in other harmful activities.\u00a0<\/p><p>Voice clone fraud poses significant risks to personal privacy, security, and trust in digital communications, highlighting the importance of robust authentication measures and awareness of potential threats in today&#8217;s technology-driven world.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-66a93f7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"66a93f7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-df97542\" data-id=\"df97542\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b1e8d6 elementor-widget elementor-widget-heading\" data-id=\"0b1e8d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is an example of deepfake fraud?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e5be745 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e5be745\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39030c2\" data-id=\"39030c2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8578c4b elementor-widget elementor-widget-text-editor\" data-id=\"8578c4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Deepfake audio fraud can manifest in various forms, such as impersonating a loved one in distress to solicit financial aid or mimicking a company executive to authorize fraudulent transactions. For instance, imagine receiving a phone call seemingly from a family member claiming to be in urgent need of financial assistance due to an unexpected emergency.\u00a0<\/p><p>The caller&#8217;s voice sounds genuine, reflecting the familiar tone and mannerisms of your relative. However, unbeknownst to you, the voice is a meticulously crafted deepfake, designed to manipulate your emotions and prompt immediate action. In another scenario, a cybercriminal might impersonate a CEO during a video conference, using a sophisticated voice clone to issue instructions for unauthorized fund transfers.\u00a0<\/p><p>These examples illustrate how deepfake audio fraud can exploit trust and deceive individuals or organizations, underscoring the importance of vigilance and verification in digital interactions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-516036e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"516036e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d9cc73\" data-id=\"9d9cc73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-332231f elementor-widget elementor-widget-heading\" data-id=\"332231f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How can deepfakes be detected?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-989ccc1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"989ccc1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d0cf092\" data-id=\"d0cf092\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6019b25 elementor-widget elementor-widget-text-editor\" data-id=\"6019b25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>At a time when deepfake technology casts doubt on the authenticity of voice-based engagements, Veridas introduces <a href=\"https:\/\/veridas.com\/voice-shield\/\">Voice Shield<\/a>. Leveraging our proven AI-driven authentication techniques, Voice Shield now provides seamless liveness detection without the need for user registration or consent.\u00a0<\/p><p>Within seconds, Voice Shield identifies the legitimacy of voices and protects against fraudulent impersonation during calls.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45d1b99 elementor-widget elementor-widget-html\" data-id=\"45d1b99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-af89ebc6-7e7e-473f-8bf4-ffc3c1b1181a\"><span class=\"hs-cta-node hs-cta-af89ebc6-7e7e-473f-8bf4-ffc3c1b1181a\" id=\"hs-cta-af89ebc6-7e7e-473f-8bf4-ffc3c1b1181a\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/af89ebc6-7e7e-473f-8bf4-ffc3c1b1181a\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-af89ebc6-7e7e-473f-8bf4-ffc3c1b1181a\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/af89ebc6-7e7e-473f-8bf4-ffc3c1b1181a.png\"  alt=\"Veridas Voice Shield Datasheet\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, 'af89ebc6-7e7e-473f-8bf4-ffc3c1b1181a', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c64a798 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c64a798\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-daeef05\" data-id=\"daeef05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0ea4082 elementor-widget elementor-widget-heading\" data-id=\"0ea4082\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Rise of Voice biometrics\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9503a5a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9503a5a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bcfb4c9\" data-id=\"bcfb4c9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6038509 elementor-widget elementor-widget-text-editor\" data-id=\"6038509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Over the past two years, Veridas has seen a significant 325% increase in the use of voice biometrics by its main clients with when analyzing real production data. This trend demonstrates that voice biometrics is gaining popularity among users, as it provides a secure and convenient method of authentication.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The rise of voice biometrics is not surprising, given its advantages over traditional authentication methods. Voice biometrics is convenient, does not require physical contact, and is highly accurate. As more companies adopt voice biometrics to enhance their security measures, it is expected to become a standard practice in the near future.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10f5225 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10f5225\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e3b554d\" data-id=\"e3b554d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-472bab6 elementor-widget elementor-widget-heading\" data-id=\"472bab6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How does voice authentication work?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-baf2560 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"baf2560\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-938d33a\" data-id=\"938d33a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d135fdf elementor-widget elementor-widget-text-editor\" data-id=\"d135fdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/veridas.com\/voice-biometric-authentication\/\"><span style=\"font-weight: 400;\">Voice biometrics<\/span><\/a><span style=\"font-weight: 400;\"> works by analyzing various voice patterns, such as pitch, tone, and rhythm, to create a unique voiceprint for each individual. This voiceprint can then be used to verify the identity of the speaker in real-time, providing a secure and seamless authentication process.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">After they are registered, the user speaks again, generating another voiceprint that is compared to the original voiceprint created at the time of registration. Veridas voice biometric solution requires only 3 seconds for authentication, providing a fast and seamless user experience while still maintaining a 99% performance rate.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Voice biometrics has been adopted by many industries, including banking, healthcare, and government agencies, as a reliable form of identity verification.<\/span><\/p><p><span style=\"font-weight: 400;\">However, as with any new technology, there are also new risks involved. One of the most significant threats is synthetic fraud, where fraudsters use pre-recorded or synthetic voices to impersonate someone else.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">These synthetic voices can be used in a variety of fraudulent activities, such as accessing someone else&#8217;s bank account, making unauthorized transactions, or even impersonating a government official to obtain sensitive information. These types of attacks can be costly for individuals and companies, leading to financial losses, damaged reputations, and compromised security.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e46bf5 elementor-widget elementor-widget-html\" data-id=\"5e46bf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-85c409ad-9f39-4f92-bb9b-eb0c0dbc5538\"><span class=\"hs-cta-node hs-cta-85c409ad-9f39-4f92-bb9b-eb0c0dbc5538\" id=\"hs-cta-85c409ad-9f39-4f92-bb9b-eb0c0dbc5538\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/85c409ad-9f39-4f92-bb9b-eb0c0dbc5538\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-85c409ad-9f39-4f92-bb9b-eb0c0dbc5538\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/85c409ad-9f39-4f92-bb9b-eb0c0dbc5538.png\"  alt=\"Calculate now\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, '85c409ad-9f39-4f92-bb9b-eb0c0dbc5538', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cd7a3e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cd7a3e6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-96caadb\" data-id=\"96caadb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e655457 elementor-widget elementor-widget-heading\" data-id=\"e655457\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to detect AI calls with biometrics?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6e2e61f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e2e61f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2982ec6\" data-id=\"2982ec6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ac74e4 elementor-widget elementor-widget-heading\" data-id=\"4ac74e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Relying on third-party verified technology\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-462089b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"462089b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ec4fb4f\" data-id=\"ec4fb4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82ae325 elementor-widget elementor-widget-text-editor\" data-id=\"82ae325\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Veridas has been at the forefront of voice biometrics development, offering its clients the latest advancements in these technologies to meet the growing demand for secure and reliable identity verification. As more and more use cases arise, such as remote working, online banking, and e-commerce, voice biometrics is set to become even more widespread in the years to come.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using a reliable and secure voice biometrics solution is crucial for companies looking to implement this technology as part of their identity verification process. Veridas offers a market-leading voice biometrics solution that is text and language independent, allowing users to speak in any language without having to repeat a specific phrase. Veridas is ranked among the top providers in the <\/span><a href=\"https:\/\/veridas.com\/what-is-nist\/\"><span style=\"font-weight: 400;\">National Institute of Technology (NIST)<\/span><\/a><span style=\"font-weight: 400;\"> Speaker Recognition Evaluation (SRE) rankings, which is the industry&#8217;s highest standard. By using third-party verified technology like Veridas, companies can ensure that their voice biometric authentication process is reliable, secure, and up-to-date with the latest fraud prevention measures.<\/span><\/p>\n<p><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cbf79d elementor-widget elementor-widget-image\" data-id=\"0cbf79d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/Veridas-call-center-agent-verification-1024x683.jpg\" class=\"attachment-large size-large wp-image-53911\" alt=\"How does voice deepfake work?\" srcset=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/Veridas-call-center-agent-verification-1024x683.jpg 1024w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/Veridas-call-center-agent-verification-300x200.jpg 300w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/Veridas-call-center-agent-verification-768x512.jpg 768w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/Veridas-call-center-agent-verification-1536x1024.jpg 1536w, https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/Veridas-call-center-agent-verification.jpg 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6afc9e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6afc9e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-402fc79\" data-id=\"402fc79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58000ae elementor-widget elementor-widget-heading\" data-id=\"58000ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Controlling the capture process\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7d5761c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7d5761c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ad1fc62\" data-id=\"ad1fc62\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3df102 elementor-widget elementor-widget-text-editor\" data-id=\"c3df102\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Voice anti-spoofing technology analyzes audio to detect what are known as &#8220;Presentation Attacks&#8221;. This type of attacks are those in which the attacker plays a pre-recorded audio through a speaker. This speaker can be that of a mobile device, a stereo, a PC or similar.<\/span><\/p><p><span style=\"font-weight: 400;\">When an audio is played through a speaker, the voice present in the audio contains hints that differentiate it from an authentic voice that is played through the vocal cords. Veridas anti-spoofing engine is trained to detect these traces and thus distinguish cases where the voice is emitted by the vocal cords from cases where the voice is reproduced through a loudspeaker.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">With this in mind, the main axis to consider when evaluating voice anti-spoofing systems is the loudspeaker used to reproduce the audio. The higher the quality of the sound equipment and the loudspeaker emitting the audio, the more similar the reproduction of the voice in the loudspeaker will be to what we would have of that same voice emitted by the vocal cords. The effect is similar to what we feel when we listen to music. If we listen to a song with high quality equipment, our perception of the sound is better than if we listen to the same song from a poor quality device.<\/span><\/p><p><span style=\"font-weight: 400;\">Currently, our anti-spoofing technology is able to achieve an accuracy of approximately 97% when the reproduced audio comes from a low-end or mid-range speaker. When the speaker is high-end, the detection capability is slightly reduced. Last week <\/span><a href=\"https:\/\/veridas.com\/new-product-release-2023-3\/\"><span style=\"font-weight: 400;\">we deployed a new version<\/span><\/a><span style=\"font-weight: 400;\"> that has increased detection capabilities on high-end speakers to 92%. The above data refers to the performance of Veridas\u2019 voice biometrics engine. However, the state of the art of the technology is at this level. That is, higher accuracies have not been achieved by any system to date.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b647f1b elementor-widget elementor-widget-spacer\" data-id=\"b647f1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-40ded89 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"40ded89\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3129f99\" data-id=\"3129f99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9be0ebd elementor-widget elementor-widget-image\" data-id=\"9be0ebd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"480\" height=\"270\" src=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/pre-recorded-voices.gif\" class=\"attachment-large size-large wp-image-51737\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3836b3c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3836b3c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-968b51d\" data-id=\"968b51d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cda12cc elementor-widget elementor-widget-text-editor\" data-id=\"cda12cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><a href=\"https:\/\/veridas.com\/telegram-demo\/\"><b><i>Try our technology for free in Telegram now<\/i><\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c514689 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c514689\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-702751f\" data-id=\"702751f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-baf8441 elementor-widget elementor-widget-heading\" data-id=\"baf8441\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Multi-factor biometric authentication\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b50f819 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b50f819\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-92e11fc\" data-id=\"92e11fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d9212b elementor-widget elementor-widget-text-editor\" data-id=\"7d9212b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Another way to strengthen an identification process is the use multi-factor authentication, where voice biometrics is combined with other forms of authentication, such as an standard identity verification process that include <\/span><a href=\"https:\/\/veridas.com\/global-document-verification\/\"><span style=\"font-weight: 400;\">document verification<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/veridas.com\/facial-recognition\/\"><span style=\"font-weight: 400;\">facial recognition<\/span><\/a><span style=\"font-weight: 400;\">. This links the identity of the user to can make it more difficult for fraudsters to impersonate someone else.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">In addition to these measures, it is essential for companies to stay up-to-date with the latest advancements in voice biometric technology and fraud prevention. In this sense, Veridas is constantly researching and developing new methods to improve the accuracy and security of voice biometrics.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-992b47f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"992b47f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d28fed\" data-id=\"4d28fed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9e75e69 elementor-widget elementor-widget-heading\" data-id=\"9e75e69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Voice biometrics, the next big trend in digital transformation\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-37a3c63 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37a3c63\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25ee8b4\" data-id=\"25ee8b4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d0a3a1 elementor-widget elementor-widget-text-editor\" data-id=\"1d0a3a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The rise of voice biometrics is making it a &#8220;must-have&#8221; for companies looking to digitally transform their operations. As the demand for secure and convenient authentication methods grows, voice biometrics is emerging as a leading solution for various industries, from finance to healthcare. With the rise of deepfake audio attacks and synthetic voice fraud, it&#8217;s crucial to ensure that your voice biometric system is secure and reliable.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By incorporating state-of-the-art voice biometric technologies, businesses can provide their users with a seamless and secure experience while protecting against fraud. As you consider your digital transformation strategy, make sure to explore the benefits of voice biometrics and choose a provider that offers reliable, secure, and user-friendly solutions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-892a3ed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"892a3ed\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c6d9ed\" data-id=\"1c6d9ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0dd5413 elementor-widget elementor-widget-html\" data-id=\"0dd5413\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper\" id=\"hs-cta-wrapper-f06219be-a5ce-447b-a502-b045a955acae\"><span class=\"hs-cta-node hs-cta-f06219be-a5ce-447b-a502-b045a955acae\" id=\"hs-cta-f06219be-a5ce-447b-a502-b045a955acae\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/19918211\/f06219be-a5ce-447b-a502-b045a955acae\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-f06219be-a5ce-447b-a502-b045a955acae\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/19918211\/f06219be-a5ce-447b-a502-b045a955acae.png\"  alt=\"New call-to-action\"\/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(19918211, 'f06219be-a5ce-447b-a502-b045a955acae', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code -->\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Learn how Veridas employs biometric authentication to identify deepfake audio. Dive into the details in our compelling post. Read more!<\/p>\n","protected":false},"author":4,"featured_media":51734,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":[252],"meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[179],"tags":[],"country":[301],"resource":[293],"topic":[250,248],"industry":[],"solution":[236],"class_list":["post-51741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veridas-en","country-global","resource-yes","format-article","topic-fraud-prevention","topic-milestones","solution-voice-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Can deepfake audio be detected? - Veridas<\/title>\n<meta name=\"description\" content=\"Learn how Veridas employs voice biometric authentication to identify deepfake audio and deepfake voice. Read more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can deepfake audio be detected? - Veridas\" \/>\n<meta property=\"og:description\" content=\"Learn how Veridas employs voice biometric authentication to identify deepfake audio and deepfake voice. Read more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/\" \/>\n<meta property=\"og:site_name\" content=\"Veridas\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-09T08:39:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T23:32:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marta Morr\u00e1s\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:site\" content=\"@VeridasOfficial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Morr\u00e1s\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/\"},\"author\":{\"name\":\"Marta Morr\u00e1s\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e\"},\"headline\":\"Can deepfake audio be detected?\",\"datePublished\":\"2023-05-09T08:39:02+00:00\",\"dateModified\":\"2024-12-19T23:32:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/\"},\"wordCount\":1606,\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg\",\"articleSection\":[\"Veridas\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/\",\"url\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/\",\"name\":\"Can deepfake audio be detected? - Veridas\",\"isPartOf\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg\",\"datePublished\":\"2023-05-09T08:39:02+00:00\",\"dateModified\":\"2024-12-19T23:32:59+00:00\",\"description\":\"Learn how Veridas employs voice biometric authentication to identify deepfake audio and deepfake voice. Read more!\",\"breadcrumb\":{\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Can deepfake audio be detected?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/veridas.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Veridas\",\"item\":\"https:\/\/veridas.com\/en\/category\/veridas-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Can deepfake audio be detected?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#website\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"name\":\"Veridas\",\"description\":\"Just be you\",\"publisher\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#organization\",\"name\":\"Veridas\",\"url\":\"https:\/\/veridas.com\/en\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png\",\"width\":2048,\"height\":1076,\"caption\":\"Veridas\"},\"image\":{\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/VeridasOfficial\",\"https:\/\/es.linkedin.com\/company\/veridas\",\"https:\/\/www.instagram.com\/veridas.life\/\",\"https:\/\/www.youtube.com\/@VeridasOfficial\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e\",\"name\":\"Marta Morr\u00e1s\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg\",\"contentUrl\":\"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg\",\"caption\":\"Marta Morr\u00e1s\"},\"description\":\"Identity Verification Expert\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/marta-morras-ruiz\/\"],\"url\":\"https:\/\/veridas.com\/en\/author\/marta-morras\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can deepfake audio be detected? - Veridas","description":"Learn how Veridas employs voice biometric authentication to identify deepfake audio and deepfake voice. Read more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/","og_locale":"en_US","og_type":"article","og_title":"Can deepfake audio be detected? - Veridas","og_description":"Learn how Veridas employs voice biometric authentication to identify deepfake audio and deepfake voice. Read more!","og_url":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/","og_site_name":"Veridas","article_published_time":"2023-05-09T08:39:02+00:00","article_modified_time":"2024-12-19T23:32:59+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg","type":"image\/jpeg"}],"author":"Marta Morr\u00e1s","twitter_card":"summary_large_image","twitter_creator":"@VeridasOfficial","twitter_site":"@VeridasOfficial","twitter_misc":{"Written by":"Marta Morr\u00e1s","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#article","isPartOf":{"@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/"},"author":{"name":"Marta Morr\u00e1s","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e"},"headline":"Can deepfake audio be detected?","datePublished":"2023-05-09T08:39:02+00:00","dateModified":"2024-12-19T23:32:59+00:00","mainEntityOfPage":{"@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/"},"wordCount":1606,"publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"image":{"@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg","articleSection":["Veridas"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/","url":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/","name":"Can deepfake audio be detected? - Veridas","isPartOf":{"@id":"https:\/\/veridas.com\/en\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage"},"image":{"@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage"},"thumbnailUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg","datePublished":"2023-05-09T08:39:02+00:00","dateModified":"2024-12-19T23:32:59+00:00","description":"Learn how Veridas employs voice biometric authentication to identify deepfake audio and deepfake voice. Read more!","breadcrumb":{"@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#primaryimage","url":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2023\/05\/voice-deepfakes.jpg","width":1920,"height":1080,"caption":"Can deepfake audio be detected?"},{"@type":"BreadcrumbList","@id":"https:\/\/veridas.com\/en\/can-deepfake-audio-detected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/veridas.com\/en\/"},{"@type":"ListItem","position":2,"name":"Veridas","item":"https:\/\/veridas.com\/en\/category\/veridas-en\/"},{"@type":"ListItem","position":3,"name":"Can deepfake audio be detected?"}]},{"@type":"WebSite","@id":"https:\/\/veridas.com\/en\/pt\/#website","url":"https:\/\/veridas.com\/en\/pt\/","name":"Veridas","description":"Just be you","publisher":{"@id":"https:\/\/veridas.com\/en\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/veridas.com\/en\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/veridas.com\/en\/pt\/#organization","name":"Veridas","url":"https:\/\/veridas.com\/en\/pt\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2021\/09\/logo-veridas-calidad.png","width":2048,"height":1076,"caption":"Veridas"},"image":{"@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/VeridasOfficial","https:\/\/es.linkedin.com\/company\/veridas","https:\/\/www.instagram.com\/veridas.life\/","https:\/\/www.youtube.com\/@VeridasOfficial"]},{"@type":"Person","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/10cafd043d622bdb4f43e04b346edc9e","name":"Marta Morr\u00e1s","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/veridas.com\/en\/pt\/#\/schema\/person\/image\/","url":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg","contentUrl":"https:\/\/veridas.com\/wp-content\/uploads\/2024\/01\/Marta-Morras-150x150.jpg","caption":"Marta Morr\u00e1s"},"description":"Identity Verification Expert","sameAs":["https:\/\/www.linkedin.com\/in\/marta-morras-ruiz\/"],"url":"https:\/\/veridas.com\/en\/author\/marta-morras\/"}]}},"_links":{"self":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/51741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/comments?post=51741"}],"version-history":[{"count":10,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/51741\/revisions"}],"predecessor-version":[{"id":85969,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/posts\/51741\/revisions\/85969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media\/51734"}],"wp:attachment":[{"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/media?parent=51741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/categories?post=51741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/tags?post=51741"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/country?post=51741"},{"taxonomy":"resource","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/resource?post=51741"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/format?post=51741"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/topic?post=51741"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/industry?post=51741"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/veridas.com\/en\/wp-json\/wp\/v2\/solution?post=51741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}