Gonzalez-Rodriguez et al., 2018 - Google Patents
An Audio Fingerprinting Approach to Replay Attack Detection on ASVSPOOF 2017 Challenge Data.Gonzalez-Rodriguez et al., 2018
View PDF- Document ID
- 12520375795454528254
- Author
- Gonzalez-Rodriguez J
- Escudero A
- de Benito-Gorrón D
- Labrador B
- Franco-Pedroso J
- Publication year
- Publication venue
- Odyssey
External Links
Snippet
Replay attacks, where an impostor replays a genuine user utterance, are a major vulnerability of speaker verification systems. Two highly likely scenarios for replay attacks are either hidden recording of actual spoken access trials, or reusing previous genuine …
- 238000001514 detection method 0 title abstract description 37
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/04—Training, enrolment or model building
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/06—Decision making techniques; Pattern matching strategies
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/005—Speaker recognisers specially adapted for particular applications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification
- G10L17/26—Recognition of special voice characteristics, e.g. for use in lie detectors; Recognition of animal voices
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/28—Constructional details of speech recognition systems
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/08—Speech classification or search
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00
- G10L25/48—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00 specially adapted for particular use
- G10L25/51—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00 specially adapted for particular use for comparison or discrimination
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/06—Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
- G10L15/065—Adaptation
- G10L15/07—Adaptation to the speaker
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00-G10L21/00
- G10L25/78—Detection of presence or absence of voice signals
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Processing of the speech or voice signal to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gałka et al. | Playback attack detection for text-dependent speaker verification over telephone channels | |
Chen et al. | Who is real bob? adversarial attacks on speaker recognition systems | |
Kinnunen et al. | The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection | |
US20180146370A1 (en) | Method and apparatus for secured authentication using voice biometrics and watermarking | |
GB2541466A (en) | Replay attack detection | |
Algabri et al. | Automatic speaker recognition for mobile forensic applications | |
Tan et al. | A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction | |
Özer et al. | Perceptual audio hashing functions | |
Paul et al. | Countermeasure to handle replay attacks in practical speaker verification systems | |
US20210304783A1 (en) | Voice conversion and verification | |
Chen et al. | AS2T: Arbitrary source-to-target adversarial attack on speaker recognition systems | |
Li et al. | Security and privacy problems in voice assistant applications: A survey | |
Firc et al. | The dawn of a text-dependent society: deepfakes as a threat to speech verification systems | |
Kassis et al. | Practical attacks on voice spoofing countermeasures | |
Adiban et al. | Sut system description for anti-spoofing 2017 challenge | |
Ze et al. | Ultrabd: Backdoor attack against automatic speaker verification systems via adversarial ultrasound | |
Liu et al. | Speaker-aware anti-spoofing | |
Gonzalez-Rodriguez et al. | An Audio Fingerprinting Approach to Replay Attack Detection on ASVSPOOF 2017 Challenge Data. | |
KR20170010978A (en) | Method and apparatus for preventing voice phishing using pattern analysis of communication content | |
Chen et al. | Push the limit of adversarial example attack on speaker recognition in physical domain | |
Ye et al. | Detection of replay attack based on normalized constant q cepstral feature | |
Schäfer et al. | Explore the world of audio deepfakes: A guide to detection techniques for non-experts | |
Nagakrishnan et al. | Generic speech based person authentication system with genuine and spoofed utterances: different feature sets and models | |
Impedovo et al. | An Investigation on Voice Mimicry Attacks to a Speaker Recognition System. | |
CN112581975B (en) | Ultrasonic voice command defense method based on signal aliasing and binaural correlation |