Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures
With the advent of automated speaker verification (ASV) systems comes an equal and
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …
Automatic speaker verification systems and spoof detection techniques: review and analysis
A Mittal, M Dua - International Journal of Speech Technology, 2022 - Springer
Automatic speaker verification (ASV) systems are enhanced enough, that industry is
attracted to use them practically in security systems. However, vulnerability of these systems …
attracted to use them practically in security systems. However, vulnerability of these systems …
A comparison of features for synthetic speech detection
The performance of biometric systems based on automatic speaker recognition technology
is severely degraded due to spoofing attacks with synthetic speech generated using different …
is severely degraded due to spoofing attacks with synthetic speech generated using different …
Advances in phase-aware signal processing in speech communication
During the past three decades, the issue of processing spectral phase has been largely
neglected in speech applications. There is no doubt that the interest of speech processing …
neglected in speech applications. There is no doubt that the interest of speech processing …
Modified magnitude-phase spectrum information for spoofing detection
Most of the existing feature representations for spoofing countermeasures consider
information either from the magnitude or phase spectrum. We hypothesize that both …
information either from the magnitude or phase spectrum. We hypothesize that both …
[PDF][PDF] Development of CRIM system for the automatic speaker verification spoofing and countermeasures challenge 2015.
The automatic speaker verification spoofing and countermeasures challenge 2015 provides
a common framework for the evaluation of spoofing countermeasures or anti-spoofing …
a common framework for the evaluation of spoofing countermeasures or anti-spoofing …
[PDF][PDF] Voice spoofing countermeasures: Taxonomy, state-of-the-art, experimental analysis of generalizability, open challenges, and the way forward
Malicious actors may seek to use different voice spoofing attacks to fool ASV systems and
even use them for spreading misinformation. Various countermeasures have been proposed …
even use them for spreading misinformation. Various countermeasures have been proposed …
Synthetic speech detection using fundamental frequency variation and spectral features
Recent works on the vulnerability of automatic speaker verification (ASV) systems confirm
that malicious spoofing attacks using synthetic speech can provoke significant increase in …
that malicious spoofing attacks using synthetic speech can provoke significant increase in …
[PDF][PDF] Speech Emotion Recognition by Combining Amplitude and Phase Information Using Convolutional Neural Network.
Previous studies of speech emotion recognition utilize convolutional neural network (CNN)
directly on amplitude spectrogram to extract features. CNN combines with bidirectional long …
directly on amplitude spectrogram to extract features. CNN combines with bidirectional long …
[PDF][PDF] Interspeech 2014 special session: Phase importance in speech processing applications
In many speech processing applications, the spectral amplitude is the dominant information
while the use of phase spectrum is not so widely spread. In this paper, we present an …
while the use of phase spectrum is not so widely spread. In this paper, we present an …