Feature extraction and learning approaches for cancellable biometrics: A survey
Biometric recognition is a widely used technology for user authentication. In the application
of this technology, biometric security and recognition accuracy are two important issues that …
of this technology, biometric security and recognition accuracy are two important issues that …
Towards understanding and mitigating audio adversarial examples for speaker recognition
Speaker recognition systems (SRSs) have recently been shown to be vulnerable to
adversarial attacks, raising significant security concerns. In this work, we systematically …
adversarial attacks, raising significant security concerns. In this work, we systematically …
[PDF][PDF] Multi-factor authentication for secured financial transactions in cloud environment
D Prabakaran, S Ramachandran - CMC-Computers, Materials & …, 2022 - cdn.techscience.cn
The rise of the digital economy and the comfort of accessing by way of user mobile devices
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
expedite human endeavors in financial transactions over the Virtual Private Network (VPN) …
{QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems
Current adversarial attacks against speaker recognition systems (SRSs) require either white-
box access or heavy black-box queries to the target SRS, thus still falling behind practical …
box access or heavy black-box queries to the target SRS, thus still falling behind practical …
A hybrid temporal feature for gear fault diagnosis using the long short term memory
ZK Abdul, AK Al-Talabani… - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
The vibration of the rotating machinery for condition monitoring in gear fault detection is a
popular area of study. Reliable improvements to the rotating machinery can be obtained by …
popular area of study. Reliable improvements to the rotating machinery can be obtained by …
Speech processing: MFCC based feature extraction techniques-an investigation
D Prabakaran, S Sriuppili - Journal of Physics: Conference …, 2021 - iopscience.iop.org
In this digital world, there are many applications to secure and legalize their data and all of
these emissions by various techniques and there are many algorithms and methods to …
these emissions by various techniques and there are many algorithms and methods to …
Chinese dialect speech recognition: a comprehensive survey
Q Li, Q Mai, M Wang, M Ma - Artificial Intelligence Review, 2024 - Springer
As a multi-ethnic country with a large population, China is endowed with diverse dialects,
which brings considerable challenges to speech recognition work. In fact, due to …
which brings considerable challenges to speech recognition work. In fact, due to …
Detecting audio copy-move forgery with an artificial neural network
F Akdeniz, Y Becerikli - Signal, Image and Video Processing, 2024 - Springer
Given how easily audio data can be obtained, audio recordings are subject to both
malicious and unmalicious tampering and manipulation that can compromise the integrity …
malicious and unmalicious tampering and manipulation that can compromise the integrity …
Study of adam and adamax optimizers on alexnet architecture for voice biometric authentication system
NAM Ariff, AR Ismail - 2023 17th International Conference on …, 2023 - ieeexplore.ieee.org
Biometric authentication has surpassed password or token authentication in significance.
Even though several methods for biometric authentication systems have been developed …
Even though several methods for biometric authentication systems have been developed …
[PDF][PDF] SEC4SR: A security analysis platform for speaker recognition
Adversarial attacks have been expanded to speaker recognition (SR). However, existing
attacks are often assessed using different SR models, recognition tasks and datasets, and …
attacks are often assessed using different SR models, recognition tasks and datasets, and …