[go: up one dir, main page]

Ye et al., 2019 - Google Patents

Detection of replay attack based on normalized constant q cepstral feature

Ye et al., 2019

Document ID
7340575982777589364
Author
Ye Y
Lao L
Yan D
Lin L
Publication year
Publication venue
2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)

External Links

Snippet

Since the voice is easy to be recorded and replayed, the replay attack is considered a major threat to the voiceprint authentication system. However, few works have focused on the text- independent detection. We found that there exist differences in spectral features between …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/04Training, enrolment or model building
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/10Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L21/00Processing of the speech or voice signal to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
    • G10L21/02Speech enhancement, e.g. noise reduction or echo cancellation
    • G10L21/0208Noise filtering
    • G10L21/0216Noise filtering characterised by the method used for estimating noise
    • G10L2021/02161Number of inputs available containing the signal or the noise to be suppressed
    • G10L2021/02166Microphone arrays; Beamforming
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates

Similar Documents

Publication Publication Date Title
Wang et al. Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones
Yang et al. Significance of subband features for synthetic speech detection
Gałka et al. Playback attack detection for text-dependent speaker verification over telephone channels
Jelil et al. Spoof Detection Using Source, Instantaneous Frequency and Cepstral Features.
Li et al. A study on replay attack and anti-spoofing for automatic speaker verification
Wu et al. A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case
Chen et al. Towards understanding and mitigating audio adversarial examples for speaker recognition
CN106297772B (en) Replay attack detection method based on the voice signal distorted characteristic that loudspeaker introduces
Alegre et al. On the vulnerability of automatic speaker recognition to spoofing attacks with artificial signals
CN109243487B (en) Playback voice detection method for normalized constant Q cepstrum features
Alegre et al. Spoofing countermeasures for the protection of automatic speaker recognition from attacks with artificial signals
US6205424B1 (en) Two-staged cohort selection for speaker verification system
US20150112682A1 (en) Method for verifying the identity of a speaker and related computer readable medium and computer
GB2541466A (en) Replay attack detection
Hashimoto et al. Privacy-preserving sound to degrade automatic speaker verification performance
Wu et al. Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints
Paul et al. Countermeasure to handle replay attacks in practical speaker verification systems
Adiban et al. Sut system description for anti-spoofing 2017 challenge
Ye et al. Detection of replay attack based on normalized constant q cepstral feature
Kassis et al. Breaking security-critical voice authentication
Garg et al. Subband analysis for performance improvement of replay attack detection in speaker verification systems
Choudhary et al. Automatic speaker verification using gammatone frequency cepstral coefficients
Weng et al. The SYSU system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge
Qadir et al. Voice spoofing countermeasure based on spectral features to detect synthetic attacks through LSTM
Zilca Text-independent speaker verification using utterance level scoring and covariance modeling