[PDF][PDF] 语音伪造及检测技术研究综述
任延珍, 刘晨雨, 刘武洋, 王丽娜 - 信号处理, 2021 - signal.ejournal.org.cn
语音承载着人类语言和说话人身份信息, 通过语音伪造技术可以精确模仿目标说话人的声音以
达到欺骗人或机器听觉的目的. 目前, 深度伪造(Deepfake) 正在对全球的政治经济及社会稳定带 …
达到欺骗人或机器听觉的目的. 目前, 深度伪造(Deepfake) 正在对全球的政治经济及社会稳定带 …
Audio Anti-Spoofing Detection: A Survey
The availability of smart devices leads to an exponential increase in multimedia content.
However, the rapid advancements in deep learning have given rise to sophisticated …
However, the rapid advancements in deep learning have given rise to sophisticated …
A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
The emergence of biometric technology provides enhanced security compared to the
traditional identification and authentication techniques that were less efficient and secure …
traditional identification and authentication techniques that were less efficient and secure …
Audio multi-view spoofing detection framework based on audio-text-emotion correlations
In recent years, audio spoofing detection has received widespread attention for protecting
personal privacy and social security. Despite the significant progress achieved in audio …
personal privacy and social security. Despite the significant progress achieved in audio …
Synthetic speech detection based on local autoregression and variance statistics
With the development of speech synthesis technology, the existing synthetic speech
detection (SSD) methods cannot generalize well for unknown synthesis algorithms. And …
detection (SSD) methods cannot generalize well for unknown synthesis algorithms. And …
A practical guide to logical access voice presentation attack detection
X Wang, J Yamagishi - Frontiers in Fake Media Generation and Detection, 2022 - Springer
Voice-based human-machine interfaces with an automatic speaker verification (ASV)
component are commonly used in the market. However, the threat from presentation attacks …
component are commonly used in the market. However, the threat from presentation attacks …
Improving self-supervised learning model for audio spoofing detection with layer-conditioned embedding fusion
The application of voice recognition systems has increased by a great deal with technology.
This has allowed adversaries to falsely claim access to these systems by spoofing the …
This has allowed adversaries to falsely claim access to these systems by spoofing the …
Vocoder detection of spoofing speech based on GAN fingerprints and domain generalization
As an important part of the text-to-speech (TTS) system, vocoders convert acoustic features
into speech waveforms. The difference in vocoders is key to producing different types of …
into speech waveforms. The difference in vocoders is key to producing different types of …
The Effect of Synthetic Voice Data Augmentation on Spoken Language Identification on Indian Languages
Multilingual based voice activated human computer interaction systems are currently in high
demand. The Spoken Language Identification Unit (SPLID) is an inevitable front end unit of …
demand. The Spoken Language Identification Unit (SPLID) is an inevitable front end unit of …
Complementary regional energy features for spoofed speech detection
G Dişken - Computer Speech & Language, 2024 - Elsevier
Automatic speaker verification systems are found to be vulnerable to spoof attacks such as
voice conversion, text-to-speech, and replayed speech. As the security of biometric systems …
voice conversion, text-to-speech, and replayed speech. As the security of biometric systems …