Identity and content authentication for phone calls

PG Traynor, BG Reaves, LE Blue, L Vargas… - US Patent …, 2020 - Google Patents
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

T Kinnunen, ZZ Wu, KA Lee, F Sedlak… - … , Speech and Signal …, 2012 - ieeexplore.ieee.org
Voice conversion-the methodology of automatically converting one's utterances to sound as
if spoken by another speaker-presents a threat for applications relying on speaker …

[PDF][PDF] Spoofing speech detection using high dimensional magnitude and phase features: the NTU approach for ASVspoof 2015 challenge.

X Xiao, X Tian, S Du, H Xu, E Chng… - …, 2015 - fontweb.oss-cn-beijing.aliyuncs.com
Recent improvement in text-to-speech (TTS) and voice conversion (VC) techniques presents
a threat to automatic speaker verification (ASV) systems. An attacker can use the TTS or VC …

Synthetic speech detection using temporal modulation feature

Z Wu, X Xiao, ES Chng, H Li - 2013 IEEE international …, 2013 - ieeexplore.ieee.org
Voice conversion and speaker adaptation techniques present a threat to current state-of-the-
art speaker verification systems. To prevent such spoofing attack and enhance the security …

[PDF][PDF] Relative phase information for detecting human speech and spoofed speech.

L Wang, Y Yoshida, Y Kawakami, S Nakagawa - INTERSPEECH, 2015 - isca-archive.org
The detection of human and spoofed (synthetic/converted) speech has started to receive
more attention. In this study, relative phase information extracted from a Fourier spectrum is …

A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case

Z Wu, T Kinnunen, ES Chng, H Li… - Proceedings of The …, 2012 - ieeexplore.ieee.org
Voice conversion technique, which modifies one speaker's (source) voice to sound like
another speaker (target), presents a threat to automatic speaker verification. In this paper …

Toward a universal synthetic speech spoofing detection using phase information

J Sanchez, I Saratxaga, I Hernaez… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
In the field of speaker verification (SV) it is nowadays feasible and relatively easy to create a
synthetic voice to deceive a speech driven biometric access system. This paper presents a …

[HTML][HTML] Speaker anonymization by modifying fundamental frequency and x-vector singular value

CO Mawalim, K Galajit, J Karnjana, S Kidani… - Computer Speech & …, 2022 - Elsevier
Speaker anonymization is a method of protecting voice privacy by concealing individual
speaker characteristics while preserving linguistic information. The VoicePrivacy Challenge …

Speaker anonymization using orthogonal householder neural network

X Miao, X Wang, E Cooper, J Yamagishi… - … on Audio, Speech …, 2023 - ieeexplore.ieee.org
Speaker anonymization aims to conceal a speaker's identity while preserving content
information in speech. Current mainstream neural-network speaker anonymization systems …

Language-independent speaker anonymization approach using self-supervised pre-trained models

X Miao, X Wang, E Cooper, J Yamagishi… - arXiv preprint arXiv …, 2022 - arxiv.org
Speaker anonymization aims to protect the privacy of speakers while preserving spoken
linguistic information from speech. Current mainstream neural network speaker …