93 Hits in 3.8 sec

Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector

Sayaka Shiota, Fernando Villavicencio, Junichi Yamagishi, Nobutaka Ono, Isao Echizen, Tomoko Matsui
2016 Odyssey 2016  
This paper presents an algorithm for detecting spoofing attacks against automatic speaker verification (ASV) systems.  ...  A previously proposed "voice liveness" detection framework aimed at validating whether speech signals were generated by a person or artificially created uses elementary algorithms to detect pop noise.  ...  Acknowledgements This work was supported in part by a Grant-in-Aid for Scientific Research (B), 26280066.  ... 
doi:10.21437/odyssey.2016-37 dblp:conf/odyssey/ShiotaVYOEM16 fatcat:vqx5n3rowbdxbjbniki7iqh5yq

Voice liveness detection using phoneme-based pop-noise detector for speaker verification

Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya
2018 Odyssey 2018 The Speaker and Language Recognition Workshop  
This paper proposes a phoneme-based pop-noise (PN) detection algorithm for voice liveness detection (VLD) and automatic speaker verification systems.  ...  A principle mechanism of almost all spoofing attacks is to replay recorded speeches via a loudspeaker.  ...  Acknowledgements This work was supported in part by Grant-in-Aid for Scientists Research (B), 26280066. References  ... 
doi:10.21437/odyssey.2018-33 dblp:conf/odyssey/MochizukiSK18 fatcat:bcvt43flkfduljxfjufzqer35e

A Continuous Liveness Detection System for Text-independent Speaker Verification [article]

Linghan Zhang, Jie Yang
2021 arXiv   pre-print
In this paper, we propose VoiceLive, a liveness detection system for both text-dependent and text-independent voice authentication on smartphones.  ...  However, recent studies show that voice authentication is vulnerable to replay attacks, where an adversary can spoof a voice authentication system using a pre-recorded voice sample collected from the victim  ...  Wang et al. use the additional channel noise of the recording and loudspeaker for attack detection [39] . Chen et al. detect the magnetic fields of the loudspeaker to confirm a replay attack [14] .  ... 
arXiv:2106.01840v1 fatcat:oooi5sugorb7vd7kqyalx3g37i


Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
In this paper, we propose VoiceLive, a practical liveness detection system for voice authentication on smartphones.  ...  attacks for liveness detection.  ...  Nitesh Saxena, and the anonymous reviewers for their insightful feedbacks.  ... 
doi:10.1145/2976749.2978296 dblp:conf/ccs/ZhangT0016 fatcat:spxg42uabfd3dedyrvzwoa22mm

Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems

Fuming Fang, Junichi Yamagishi, Isao Echizen, Md Sahidullah, Tomi Kinnunen
2018 2018 IEEE International Workshop on Information Forensics and Security (WIFS)  
This type of attack is thus an urgent problem needing to be solved. Playback detector ASV module Authentication Speech enhancement Playback Re-recording Attacker Upload Download Online Offline  ...  Since current playback detection models are almost always trained using genuine and playedback speech, it may be possible to degrade their performance by transforming the acoustic characteristics of the  ...  Nguyen, the Graduate University for Advanced Studies (SOKENDAI), for comments on an earlier versions of the manuscript.  ... 
doi:10.1109/wifs.2018.8630764 dblp:conf/wifs/FangYESK18 fatcat:t42w6irmcnbmrhnqu67cbuk5ca

VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges

Rui Zhang, Zheng Yan, Xuerui Wang, Robert Deng
2022 IEEE Transactions on Dependable and Secure Computing  
for authentication.  ...  In this paper, we propose a leakage resilient user authentication cloud service with privacy preservation based on random personal voice challenges, named VOLERE (VOice LEakage REsilient).  ...  By applying the synthesized voiceprints for user authentication based on random personal voice challenges, it is resilient in the face of original normal voice leakage and can successfully resist replay  ... 
doi:10.1109/tdsc.2022.3147504 fatcat:njnondatlffkrdr6ikj2c2vmga

Introduction to Voice Presentation Attack Detection and Recent Advances [article]

Md Sahidullah, Hector Delgado, Massimiliano Todisco, Tomi Kinnunen, Nicholas Evans, Junichi Yamagishi, Kong-Aik Lee
2019 arXiv   pre-print
Over the past few years significant progress has been made in the field of presentation attack detection (PAD) for automatic speaker recognition (ASV).  ...  These show that ASV PAD remains an unsolved problem and that further attention is required to develop generalised PAD solutions which have potential to detect diverse and previously unseen spoofing attacks  ...  Replay attacks incur channel noise from both the recording device and the loudspeaker used for replay and thus the detection of channel effects beyond those introduced by the recording device of the ASV  ... 
arXiv:1901.01085v1 fatcat:4dxlmlyflzgnjc7jic2fwm3s6e

Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems [article]

Fuming Fang, Junichi Yamagishi, Isao Echizen, Md Sahidullah, Tomi Kinnunen
2018 arXiv   pre-print
Since current playback detection models are almost always trained using genuine and played-back speech, it may be possible to degrade their performance by transforming the acoustic characteristics of the  ...  neural network-based method.  ...  Nguyen, the Graduate University for Advanced Studies (SOKENDAI), for comments on an earlier versions of the manuscript.  ... 
arXiv:1809.04274v2 fatcat:4ybwlcxienarldnd2lws7jyvha

Multi-factor segmentation for topic visualization and recommendation

Chidansh Amitkumar Bhatt, Andrei Popescu-Belis, Maryam Habibi, Sandy Ingram, Stefano Masneri, Fergus McInnes, Nikolaos Pappas, Oliver Schreer
2013 Proceedings of the 21st ACM international conference on Multimedia - MM '13  
The focus of this thesis is on the performance of humans in detecting altered samples from replay, speech synthesis (TTS) and voice conversion (VC) systems.  ...  The participants were asked to assess a series of recordings by first giving a binary evaluation ("authentic" or "altered") and then by specifying their level of confidence on a 5-point scale.  ...  This choice was based upon the need for creating carefully controlled setups where variables can be changed one by one .  ... 
doi:10.1145/2502081.2508120 dblp:conf/mm/BhattPHIMMPS13 fatcat:lgu5czbhsrfw7asxdwv7klfz7m

Audio Replay Attack Detection in Automated Speaker Verification

Pooja Anjee, Shubham Ghosh, Shrirag Kodoor, Rajashree Shettar
2018 International Journal of Computer Applications  
Automated Speaker Verification (ASV) systems are extensively used for authentication and verification measures. Countermeasures are developed for ASV systems to protect it from audio replay attacks.  ...  Overall, the paper describes a generalized system capable to detection of replay attacks in known and unknown conditions.  ...  Replay attacks are conducted by using a recording of a speaker"s voice which are replayed to the ASV system.  ... 
doi:10.5120/ijca2018916986 fatcat:25uuzg6a6fb7lixqdi2y3fguri

ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements

Héctor Delgado, Massimiliano Todisco, Md Sahidullah, Nicholas Evans, Tomi Kinnunen, Kong Aik Lee, Junichi Yamagishi
2018 Odyssey 2018 The Speaker and Language Recognition Workshop  
The first competitive ASVspoof challenge held in 2015 focused on the assessment of countermeasures to protect ASV technology from voice conversion and speech synthesis spoofing attacks.  ...  These support the analysis of replay detection performance and limits.  ...  The first focused on developing countermeasures to defend against converted voice and synthetic speech spoofing attacks whereas the second focused on replay attacks.  ... 
doi:10.21437/odyssey.2018-42 dblp:conf/odyssey/DelgadoTSD18 fatcat:5az2p4oezjc5rmelh4tsfxerzi

Adversary Models for Mobile Device Authentication [article]

René Mayrhofer, Vishwath Mohan, Stephan Sigg
2020 arXiv   pre-print
Unfortunately, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security.  ...  Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods having been proposed and analyzed.  ...  For instance, already a minimal e ort attack using voice impersonation (replay) might trick the system [47] .  ... 
arXiv:2009.10150v1 fatcat:hxdqh4hpqvg2dfwf54o7hggvnm

Personal Voice Assistant Security and Privacy--A Survey

Peng Cheng, Utz Roedig
2022 Proceedings of the IEEE  
We also discuss work that looks at privacy implications; for example, work on management of recording Manuscript  ...  We highlight established areas such as voice authentication (VA) and new areas such as acoustic Denial of Service (DoS) that deserve more attention.  ...  This scenario is used to study replay attacks; to distinguish a voice signal from a human speaker and a replay from a loudspeaker.  ... 
doi:10.1109/jproc.2022.3153167 fatcat:hxnntjl3lnhabc37bn4y77wwhi

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems [article]

Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu
2020 arXiv   pre-print
The popularity of SR brings in serious security concerns, as demonstrated by recent adversarial attacks.  ...  Last but not least, we show that four promising defense methods for adversarial attack from the speech recognition domain become ineffective on SRSs against FAKEBOB, which calls for more effective defense  ...  Adversarial voices also need to be played via loudspeakers, hence liveness detection could be possibly used to detect them.  ... 
arXiv:1911.01840v2 fatcat:oruwokz2qngcff6kvwdngulej4

A Survey on Amazon Alexa Attack Surfaces [article]

Yanyan Li, Sara Kim, Eric Sy
2021 arXiv   pre-print
We also discuss the potential mitigation solutions for each attack surface to better improve Alexa or other voice assistants in terms of security and privacy.  ...  The success of Alexa is based on its effortless usability, but in turn, that has led to a lack of sufficient security.  ...  Most loudspeakers inherently add distortions to original sounds while replaying them, making the overall power distribution over the audible frequency range show some uniformity and linearity.  ... 
arXiv:2102.11442v1 fatcat:kyo7jhjd2zen5o2ebd26wuj4na
« Previous Showing results 1 — 15 out of 93 results