Identity and content authentication for phone calls
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
Voice conversion-the methodology of automatically converting one's utterances to sound as
if spoken by another speaker-presents a threat for applications relying on speaker …
if spoken by another speaker-presents a threat for applications relying on speaker …
[PDF][PDF] Spoofing speech detection using high dimensional magnitude and phase features: the NTU approach for ASVspoof 2015 challenge.
Recent improvement in text-to-speech (TTS) and voice conversion (VC) techniques presents
a threat to automatic speaker verification (ASV) systems. An attacker can use the TTS or VC …
a threat to automatic speaker verification (ASV) systems. An attacker can use the TTS or VC …
Synthetic speech detection using temporal modulation feature
Voice conversion and speaker adaptation techniques present a threat to current state-of-the-
art speaker verification systems. To prevent such spoofing attack and enhance the security …
art speaker verification systems. To prevent such spoofing attack and enhance the security …
[PDF][PDF] Relative phase information for detecting human speech and spoofed speech.
L Wang, Y Yoshida, Y Kawakami, S Nakagawa - INTERSPEECH, 2015 - isca-archive.org
The detection of human and spoofed (synthetic/converted) speech has started to receive
more attention. In this study, relative phase information extracted from a Fourier spectrum is …
more attention. In this study, relative phase information extracted from a Fourier spectrum is …
A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case
Voice conversion technique, which modifies one speaker's (source) voice to sound like
another speaker (target), presents a threat to automatic speaker verification. In this paper …
another speaker (target), presents a threat to automatic speaker verification. In this paper …
Toward a universal synthetic speech spoofing detection using phase information
In the field of speaker verification (SV) it is nowadays feasible and relatively easy to create a
synthetic voice to deceive a speech driven biometric access system. This paper presents a …
synthetic voice to deceive a speech driven biometric access system. This paper presents a …
[HTML][HTML] Speaker anonymization by modifying fundamental frequency and x-vector singular value
Speaker anonymization is a method of protecting voice privacy by concealing individual
speaker characteristics while preserving linguistic information. The VoicePrivacy Challenge …
speaker characteristics while preserving linguistic information. The VoicePrivacy Challenge …
Speaker anonymization using orthogonal householder neural network
Speaker anonymization aims to conceal a speaker's identity while preserving content
information in speech. Current mainstream neural-network speaker anonymization systems …
information in speech. Current mainstream neural-network speaker anonymization systems …
Language-independent speaker anonymization approach using self-supervised pre-trained models
Speaker anonymization aims to protect the privacy of speakers while preserving spoken
linguistic information from speech. Current mainstream neural network speaker …
linguistic information from speech. Current mainstream neural network speaker …