Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures
With the advent of automated speaker verification (ASV) systems comes an equal and
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …
Asvspoof 2021: Towards spoofed and deepfake speech detection in the wild
Benchmarking initiatives support the meaningful comparison of competing solutions to
prominent problems in speech and language processing. Successive benchmarking …
prominent problems in speech and language processing. Successive benchmarking …
[PDF][PDF] Generalization of Audio Deepfake Detection.
Audio Deepfakes, technically known as logical-access voice spoofing techniques, have
become an increased threat on voice interfaces due to the recent breakthroughs in speech …
become an increased threat on voice interfaces due to the recent breakthroughs in speech …
Analyzing noise robustness of MFCC and GFCC features in speaker identification
Automatic speaker recognition can achieve a high level of performance in matched training
and testing conditions. However, such performance drops significantly in mismatched noisy …
and testing conditions. However, such performance drops significantly in mismatched noisy …
CASA-based robust speaker identification
Conventional speaker recognition systems perform poorly under noisy conditions. Inspired
by auditory perception, computational auditory scene analysis (CASA) typically segregates …
by auditory perception, computational auditory scene analysis (CASA) typically segregates …
FuzzyGCP: A deep learning architecture for automatic spoken language identification from speech signals
In this modern era, language has no geographic boundary. Therefore, for developing an
automated system for search engines using audio, tele-medicine, emergency service via …
automated system for search engines using audio, tele-medicine, emergency service via …
Cross-modal information fusion for voice spoofing detection
In recent years, speaker verification systems have been used in many production scenarios.
Unfortunately, they are still very vulnerable to different kinds of spoofing attacks, such as …
Unfortunately, they are still very vulnerable to different kinds of spoofing attacks, such as …
Voice spoofing countermeasure for logical access attacks detection
Voice-driven devices (VDDs) like Google Home and Amazon Alexa, which are well-known
connected devices in consumer IoT, have applications in various domains ie, home …
connected devices in consumer IoT, have applications in various domains ie, home …
A comparison of cepstral features in the detection of pathological voices by varying the input and filterbank of the cepstrum computation
Automatic voice pathology detection enables objective assessment of pathologies that affect
the voice production mechanism. Detection systems have been developed using the …
the voice production mechanism. Detection systems have been developed using the …
Antifake: Using adversarial audio to prevent unauthorized speech synthesis
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …
realistic speech synthesis. While this technology has great potential to improve lives, it also …