Janicki et al., 2016 - Google Patents
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacksJanicki et al., 2016
View PDF- Document ID
- 516165696781908816
- Author
- Janicki A
- Alegre F
- Evans N
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
This paper analyses the threat of replay spoofing or presentation attacks in the context of automatic speaker verification. As relatively high‐technology attacks, speech synthesis and voice conversion, which have thus far received far greater attention in the literature, are …
- 230000015572 biosynthetic process 0 abstract description 58
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/08—Speech classification or search
- G10L15/18—Speech classification or search using natural language modelling
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Processing of the speech or voice signal to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
- G10L21/0208—Noise filtering
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/065—Adaptation
- G10L15/07—Adaptation to the speaker
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/10—Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/04—Training, enrolment or model building
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/26—Recognition of special voice characteristics, e.g. for use in lie detectors; Recognition of animal voices
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/02—Feature extraction for speech recognition; Selection of recognition unit
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/005—Speaker recognisers specially adapted for particular applications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00
- G10L25/48—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00 specially adapted for particular use
- G10L25/51—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00 specially adapted for particular use for comparison or discrimination
- G10L25/66—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00 specially adapted for particular use for comparison or discrimination for extracting parameters related to health condition
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00
- G10L25/78—Detection of presence or absence of voice signals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Janicki et al. | An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks | |
Alegre et al. | Re-assessing the threat of replay spoofing attacks against automatic speaker verification | |
Abdullah et al. | Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems | |
Abdullah et al. | Practical hidden voice attacks against speech and speaker recognition systems | |
Schönherr et al. | Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding | |
Sahidullah et al. | Introduction to voice presentation attack detection and recent advances | |
Chen et al. | Who is real bob? adversarial attacks on speaker recognition systems | |
Malik et al. | A light-weight replay detection framework for voice controlled IoT devices | |
Qian et al. | Hidebehind: Enjoy voice input with voiceprint unclonability and anonymity | |
Alegre et al. | On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals | |
US8160877B1 (en) | Hierarchical real-time speaker recognition for biometric VoIP verification and targeting | |
Sriskandaraja et al. | Front-end for antispoofing countermeasures in speaker verification: Scattering spectral decomposition | |
Arif et al. | Voice spoofing countermeasure for logical access attacks detection | |
Rao et al. | Robust speaker recognition in noisy environments | |
Yu et al. | Antifake: Using adversarial audio to prevent unauthorized speech synthesis | |
Li et al. | Security and privacy problems in voice assistant applications: A survey | |
Zheng et al. | Robustness-related issues in speaker recognition | |
Bhangale et al. | Synthetic speech spoofing detection using MFCC and radial basis function SVM | |
Demiroglu et al. | Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors | |
Park et al. | User authentication method via speaker recognition and speech synthesis detection | |
Kuznetsov et al. | Methods of countering speech synthesis attacks on voice biometric systems in banking | |
Aziz et al. | Enhancing children’s short utterance-based asv using inverse gamma-tone filtered cepstral coefficients | |
Saleema et al. | Voice biometrics: the promising future of authentication in the internet of things | |
Alegre et al. | Evasion and obfuscation in speaker recognition surveillance and forensics | |
Nagakrishnan et al. | Generic speech based person authentication system with genuine and spoofed utterances: different feature sets and models |