Advances in data preprocessing for biomedical data fusion: An overview of the methods, challenges, and prospects

S Wang, ME Celebi, YD Zhang, X Yu, S Lu, X Yao… - Information …, 2021 - Elsevier
Due to the proliferation of biomedical imaging modalities, such as Photoacoustic
Tomography, Computed Tomography (CT), Optical Microscopy and Tomography, etc …

Towards end-to-end synthetic speech detection

G Hua, ABJ Teoh, H Zhang - IEEE Signal Processing Letters, 2021 - ieeexplore.ieee.org
The constant Q transform (CQT) has been shown to be one of the most effective speech
signal pre-transforms to facilitate synthetic speech detection, followed by either hand-crafted …

A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction

CB Tan, MHA Hijazi, N Khamis… - Multimedia Tools and …, 2021 - Springer
The emergence of biometric technology provides enhanced security compared to the
traditional identification and authentication techniques that were less efficient and secure …

Secure automatic speaker verification (SASV) system through sm-ALTP features and asymmetric bagging

M Aljasem, A Irtaza, H Malik, N Saba… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The growing number of voice-enabled devices and applications consider automatic speaker
verification (ASV) a fundamental component. However, maximum outreach for ASV in critical …

[HTML][HTML] A robust voice spoofing detection system using novel CLS-LBP features and LSTM

H Dawood, S Saleem, F Hassan, A Javed - Journal of King Saud University …, 2022 - Elsevier
Abstract Automatic Speaker Verification (ASV) systems are vulnerable to a variety of voice
spoofing attacks, eg, replays, speech synthesis, etc. The imposters/fraudsters often use …

Multi-task learning improves synthetic speech detection

Y Mo, S Wang - … 2022-2022 IEEE International Conference on …, 2022 - ieeexplore.ieee.org
With the development of deep learning, synthetic speech has become more and more
realistic and easier to spoof Automatic Speaker Verification (ASV) devices. Based on mining …

Texture analysis of edge mapped audio spectrogram for spoofing attack detection

F Meriem, B Messaoud, Y Bahia - Multimedia Tools and Applications, 2024 - Springer
The vulnerability of the Automatic Speaker verification technology to different presentation
attacks has drawn much interest to design anti-spoofing countermeasures. Following their …

On significance of constant-Q transform for pop noise detection

K Khoria, AT Patil, HA Patil - Computer Speech & Language, 2023 - Elsevier
Liveness detection has emerged as an important research issue for many biometrics, such
as face, iris, hand geometry, etc. and significant research efforts are reported in the literature …

Implicit processing of linear prediction residual for replay attack detection

S Veesa, M Singh - International Journal of Speech Technology, 2024 - Springer
This work explores linear prediction (LP) residual based excitation source features for
detection of replay speech signals. The LP residual signal is derived from speech using the …

SDI: A tool for speech differentiation in user identification

MA Basit, C Liu, E Zhao - Expert Systems with Applications, 2024 - Elsevier
User identification (UI) with human speech is important in voice biometrics for user
authentication. However, the recognized speech is at risk of being spoofed when an intruder …