Audio deepfake detection: A survey

J Yi, C Wang, J Tao, X Zhang, CY Zhang… - arxiv preprint arxiv …, 2023 - arxiv.org
Audio deepfake detection is an emerging active topic. A growing number of literatures have
aimed to study deepfake detection algorithms and achieved effective performance, the …

Speaker recognition by machines and humans: A tutorial review

JHL Hansen, T Hasan - IEEE Signal processing magazine, 2015 - ieeexplore.ieee.org
Identifying a person by his or her voice is an important human trait most take for granted in
natural human-to-human interaction/communication. Speaking to someone over the …

Trends in audio signal feature extraction methods

G Sharma, K Umapathy, S Krishnan - Applied Acoustics, 2020 - Elsevier
Audio signal processing algorithms generally involves analysis of signal, extracting its
properties, predicting its behaviour, recognizing if any pattern is present in the signal, and …

[PDF][PDF] Generalization of Audio Deepfake Detection.

T Chen, A Kumar, P Nagarsheth, G Sivaraman… - Odyssey, 2020 - researchgate.net
Audio Deepfakes, technically known as logical-access voice spoofing techniques, have
become an increased threat on voice interfaces due to the recent breakthroughs in speech …

Replay and synthetic speech detection with res2net architecture

X Li, N Li, C Weng, X Liu, D Su, D Yu… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
Existing approaches for replay and synthetic speech detection still lack generalizability to
unseen spoofing attacks. This work proposes to leverage a novel model structure, so-called …

ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge

Z Wu, T Kinnunen, N Evans, J Yamagishi… - INTERSPEECH 2015 …, 2015 - hal.science
An increasing number of independent studies have confirmed the vulnerability of automatic
speaker verification (ASV) technology to spoofing. However, in comparison to that involving …

Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

A comparison of features for synthetic speech detection

M Sahidullah, T Kinnunen, C Hanilçi - 2015 - erepo.uef.fi
The performance of biometric systems based on automatic speaker recognition technology
is severely degraded due to spoofing attacks with synthetic speech generated using different …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

ASSERT: Anti-spoofing with squeeze-excitation and residual networks

CI Lai, N Chen, J Villalba, N Dehak - arxiv preprint arxiv:1904.01120, 2019 - arxiv.org
We present JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …