Spoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …
the technology can be susceptible to malicious spoofing attacks. The research community …
Hotword recognition
M Sharifi, JN Foerster - US Patent 9,747,926, 2017 - Google Patents
Methods, systems, and apparatus, including computer programs encoded on a computer
storage medium, for receiving audio data corresponding to an utterance, determining that …
storage medium, for receiving audio data corresponding to an utterance, determining that …
[PDF][PDF] Распознавание личности по голосу: аналитический обзор
ВН Сорокин, ВВ Вьюгин, АА Тананыкин - Информационные процессы, 2012 - jip.ru
Задача распознавания диктора по его голосу была поставлена более 40 лет тому
назад, и исследования в этой области все еще продолжаются. Решение этой задачи …
назад, и исследования в этой области все еще продолжаются. Решение этой задачи …
Hotword recognition
M Sharifi, JN Foerster - US Patent 9,928,840, 2018 - Google Patents
Methods, systems, and apparatus, including computer programs encoded on a computer
storage medium, for receiving audio data corresponding to an utterance, determining that …
storage medium, for receiving audio data corresponding to an utterance, determining that …
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification
This paper proposes a novel countermeasure framework to detect spoofing attacks to
reduce the vulnerability of automatic speaker verification (ASV) systems. Recently, ASV …
reduce the vulnerability of automatic speaker verification (ASV) systems. Recently, ASV …
[图书][B] Digital watermarking
Due to wide range of digital watermarking applications in digital world, available digital
watermarking books just concentrate on specific application of digital watermarking such as …
watermarking books just concentrate on specific application of digital watermarking such as …
Voice conversion and spoofing attack on speaker verification systems
Speaker verification system automatically accepts or rejects the claimed identity of a
speaker. Recently, we have made major progress in speaker verification which leads to …
speaker. Recently, we have made major progress in speaker verification which leads to …
Hotword recognition
M Sharifi, JN Foerster - US Patent 10,650,828, 2020 - Google Patents
Methods, systems, and apparatus, including computer programs encoded on a computer
storage medium, for receiving audio data corresponding to an utterance, determining that …
storage medium, for receiving audio data corresponding to an utterance, determining that …
Voice conversion versus speaker verification: an overview
A speaker verification system automatically accepts or rejects a claimed identity of a speaker
based on a speech sample. Recently, a major progress was made in speaker verification …
based on a speech sample. Recently, a major progress was made in speaker verification …
On the study of replay and voice conversion attacks to text-dependent speaker verification
Automatic speaker verification (ASV) is to automatically accept or reject a claimed identity
based on a speech sample. Recently, individual studies have confirmed the vulnerability of …
based on a speech sample. Recently, individual studies have confirmed the vulnerability of …