[go: up one dir, main page]

Chen et al., 2021 - Google Patents

Who is real bob? adversarial attacks on speaker recognition systems

Chen et al., 2021

View PDF
Document ID
8049094196660891512
Author
Chen G
Chenb S
Fan L
Du X
Zhao Z
Song F
Liu Y
Publication year
Publication venue
2021 IEEE Symposium on Security and Privacy (SP)

External Links

Snippet

Speaker recognition (SR) is widely used in our daily life as a biometric authentication or identification mechanism. The popularity of SR brings in serious security concerns, as demonstrated by recent adversarial attacks. However, the impacts of such threats in the …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/04Training, enrolment or model building
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/06Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
    • G10L15/065Adaptation
    • G10L15/07Adaptation to the speaker

Similar Documents

Publication Publication Date Title
Chen et al. Who is real bob? adversarial attacks on speaker recognition systems
Abdullah et al. Practical hidden voice attacks against speech and speaker recognition systems
Abdullah et al. Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems
Li et al. Adversarial attacks on GMM i-vector based speaker verification systems
Kamble et al. Advances in anti-spoofing: from the perspective of ASVspoof challenges
Chen et al. Towards understanding and mitigating audio adversarial examples for speaker recognition
Zhang et al. Voiceprint mimicry attack towards speaker verification system in smart home
Gałka et al. Playback attack detection for text-dependent speaker verification over telephone channels
Zhang et al. Attack on practical speaker verification system using universal adversarial perturbations
Sriskandaraja et al. Front-end for antispoofing countermeasures in speaker verification: Scattering spectral decomposition
Qian et al. Voicemask: Anonymize and sanitize voice input on mobile devices
Marras et al. Adversarial Optimization for Dictionary Attacks on Speaker Verification.
Huang et al. Stop deceiving! an effective defense scheme against voice impersonation attacks on smart devices
Chen et al. {QFA2SR}:{Query-Free} Adversarial Transfer Attacks to Speaker Recognition Systems
Ren et al. Replay attack detection based on distortion by loudspeaker for voice authentication
Jiang et al. Securing liveness detection for voice authentication via pop noises
Cai et al. Identifying source speakers for voice conversion based spoofing attacks on speaker verification systems
Kassis et al. Practical attacks on voice spoofing countermeasures
Han et al. Accuth $^+ $+: Accelerometer-Based Anti-Spoofing Voice Authentication on Wrist-Worn Wearables
Yasur et al. Deepfake captcha: A method for preventing fake calls
Zhang et al. Volere: Leakage resilient user authentication based on personal voice challenges
Shang et al. Srvoice: A robust sparse representation-based liveness detection system
Park et al. User authentication method via speaker recognition and speech synthesis detection
Nagakrishnan et al. Generic speech based person authentication system with genuine and spoofed utterances: different feature sets and models
Cao et al. LiveProbe: Exploring continuous voice liveness detection via phonemic energy response patterns