Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures

A Khan, KM Malik, J Ryan, M Saravanan - Artificial Intelligence Review, 2023 - Springer
With the advent of automated speaker verification (ASV) systems comes an equal and
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …

A survey on the detection and impacts of deepfakes in visual, audio, and textual formats

R Mubarak, T Alsboui, O Alshaikh, I Inuwa-Dutse… - Ieee …, 2023 - ieeexplore.ieee.org
In the rapidly evolving digital landscape, the generation of fake visual, audio, and textual
content poses a significant threat to the trust of society, political stability, and integrity of …

Toward understanding and boosting adversarial transferability from a distribution perspective

Y Zhu, Y Chen, X Li, K Chen, Y He… - … on Image Processing, 2022 - ieeexplore.ieee.org
Transferable adversarial attacks against Deep neural networks (DNNs) have received broad
attention in recent years. An adversarial example can be crafted by a surrogate model and …

Audio deepfake approaches

OA Shaaban, R Yildirim, AA Alguttar - IEEE Access, 2023 - ieeexplore.ieee.org
This paper presents a review of techniques involved in the creation and detection of audio
deepfakes, the first section provides information about general deep fakes. In the second …

Lightweight voice spoofing detection using improved one-class learning and knowledge distillation

Y Ren, H Peng, L Li, Y Yang - IEEE Transactions on Multimedia, 2023 - ieeexplore.ieee.org
Voice spoofing detection is a technique for enhancing the security of automatic speaker
verification system, but the existing research still faces problems such as weak detection …

Generalized voice spoofing detection via integral knowledge amalgamation

Y Ren, H Peng, L Li, X Xue, Y Lan… - IEEE/ACM Transactions …, 2023 - ieeexplore.ieee.org
Most of the voice spoofing detection methods are designed for specific kinds of spoofing
attacks, synthetic or replay. In practice, however, there is no prior information about these …

Is synthetic voice detection research going into the right direction?

S Borzì, O Giudice, F Stanco… - Proceedings of the …, 2022 - openaccess.thecvf.com
Abstract Machine Learning, and in general Artificial Intelligence approaches, brought a great
advance in each and every field of Computer Science increasing accuracy levels of …

[HTML][HTML] A robust voice spoofing detection system using novel CLS-LBP features and LSTM

H Dawood, S Saleem, F Hassan, A Javed - Journal of King Saud University …, 2022 - Elsevier
Abstract Automatic Speaker Verification (ASV) systems are vulnerable to a variety of voice
spoofing attacks, eg, replays, speech synthesis, etc. The imposters/fraudsters often use …

A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation

Y Ren, H Peng, L Li, X Xue, Y Lan, Y Yang - Journal of Systems …, 2023 - Elsevier
Voice anti-spoofing is an important step for secure speaker verification in voice-enabled
Internet of Things (IoT) systems. Most voice spoofing detection methods require significant …