Ye et al., 2019 - Google Patents
Detection of replay attack based on normalized constant q cepstral featureYe et al., 2019
- Document ID
- 7340575982777589364
- Author
- Ye Y
- Lao L
- Yan D
- Lin L
- Publication year
- Publication venue
- 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)
External Links
Snippet
Since the voice is easy to be recorded and replayed, the replay attack is considered a major threat to the voiceprint authentication system. However, few works have focused on the text- independent detection. We found that there exist differences in spectral features between …
- 238000001514 detection method 0 title abstract description 32
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/04—Training, enrolment or model building
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/10—Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Processing of the speech or voice signal to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
- G10L21/0208—Noise filtering
- G10L21/0216—Noise filtering characterised by the method used for estimating noise
- G10L2021/02161—Number of inputs available containing the signal or the noise to be suppressed
- G10L2021/02166—Microphone arrays; Beamforming
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/08—Use of distortion metrics or a particular distance between probe pattern and reference templates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones | |
Yang et al. | Significance of subband features for synthetic speech detection | |
Gałka et al. | Playback attack detection for text-dependent speaker verification over telephone channels | |
Jelil et al. | Spoof Detection Using Source, Instantaneous Frequency and Cepstral Features. | |
Li et al. | A study on replay attack and anti-spoofing for automatic speaker verification | |
Wu et al. | A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case | |
Chen et al. | Towards understanding and mitigating audio adversarial examples for speaker recognition | |
CN106297772B (en) | Replay attack detection method based on the voice signal distorted characteristic that loudspeaker introduces | |
Alegre et al. | On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals | |
CN109243487B (en) | Playback voice detection method for normalized constant Q cepstrum features | |
Alegre et al. | Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals | |
US6205424B1 (en) | Two-staged cohort selection for speaker verification system | |
US20150112682A1 (en) | Method for verifying the identity of a speaker and related computer readable medium and computer | |
GB2541466A (en) | Replay attack detection | |
Hashimoto et al. | Privacy-preserving sound to degrade automatic speaker verification performance | |
Wu et al. | Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints | |
Paul et al. | Countermeasure to handle replay attacks in practical speaker verification systems | |
Adiban et al. | Sut system description for anti-spoofing 2017 challenge | |
Ye et al. | Detection of replay attack based on normalized constant q cepstral feature | |
Kassis et al. | Breaking security-critical voice authentication | |
Garg et al. | Subband analysis for performance improvement of replay attack detection in speaker verification systems | |
Choudhary et al. | Automatic speaker verification using gammatone frequency cepstral coefficients | |
Weng et al. | The SYSU system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge | |
Qadir et al. | Voice spoofing countermeasure based on spectral features to detect synthetic attacks through LSTM | |
Zilca | Text-independent speaker verification using utterance level scoring and covariance modeling |