[PDF][PDF] 语音伪造及检测技术研究综述

任延珍, 刘晨雨, 刘武洋, 王丽娜 - 信号处理, 2021 - signal.ejournal.org.cn
语音承载着人类语言和说话人身份信息, 通过语音伪造技术可以精确模仿目标说话人的声音以
达到欺骗人或机器听觉的目的. 目前, 深度伪造(Deepfake) 正在对全球的政治经济及社会稳定带 …

Audio Anti-Spoofing Detection: A Survey

M Li, Y Ahmadiadli, XP Zhang - arXiv preprint arXiv:2404.13914, 2024 - arxiv.org
The availability of smart devices leads to an exponential increase in multimedia content.
However, the rapid advancements in deep learning have given rise to sophisticated …

A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction

CB Tan, MHA Hijazi, N Khamis… - Multimedia Tools and …, 2021 - Springer
The emergence of biometric technology provides enhanced security compared to the
traditional identification and authentication techniques that were less efficient and secure …

Audio multi-view spoofing detection framework based on audio-text-emotion correlations

J Wu, Q Yin, Z Sheng, W Lu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In recent years, audio spoofing detection has received widespread attention for protecting
personal privacy and social security. Despite the significant progress achieved in audio …

Synthetic speech detection based on local autoregression and variance statistics

S Cui, B Huang, J Huang, X Kang - IEEE Signal Processing …, 2022 - ieeexplore.ieee.org
With the development of speech synthesis technology, the existing synthetic speech
detection (SSD) methods cannot generalize well for unknown synthesis algorithms. And …

A practical guide to logical access voice presentation attack detection

X Wang, J Yamagishi - Frontiers in Fake Media Generation and Detection, 2022 - Springer
Voice-based human-machine interfaces with an automatic speaker verification (ASV)
component are commonly used in the market. However, the threat from presentation attacks …

Improving self-supervised learning model for audio spoofing detection with layer-conditioned embedding fusion

S Sinha, S Dey, G Saha - Computer Speech & Language, 2024 - Elsevier
The application of voice recognition systems has increased by a great deal with technology.
This has allowed adversaries to falsely claim access to these systems by spoofing the …

Vocoder detection of spoofing speech based on GAN fingerprints and domain generalization

F Li, Y Chen, H Liu, Z Zhao, Y Yao, X Liao - ACM Transactions on …, 2024 - dl.acm.org
As an important part of the text-to-speech (TTS) system, vocoders convert acoustic features
into speech waveforms. The difference in vocoders is key to producing different types of …

The Effect of Synthetic Voice Data Augmentation on Spoken Language Identification on Indian Languages

AR Ambili, RC Roy - IEEE Access, 2023 - ieeexplore.ieee.org
Multilingual based voice activated human computer interaction systems are currently in high
demand. The Spoken Language Identification Unit (SPLID) is an inevitable front end unit of …

Complementary regional energy features for spoofed speech detection

G Dişken - Computer Speech & Language, 2024 - Elsevier
Automatic speaker verification systems are found to be vulnerable to spoof attacks such as
voice conversion, text-to-speech, and replayed speech. As the security of biometric systems …