A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Voice Liveness Detection for Speaker Verification based on a Tandem Single/Double-channel Pop Noise Detector
2016
Odyssey 2016
This paper presents an algorithm for detecting spoofing attacks against automatic speaker verification (ASV) systems. ...
A previously proposed "voice liveness" detection framework aimed at validating whether speech signals were generated by a person or artificially created uses elementary algorithms to detect pop noise. ...
Acknowledgements This work was supported in part by a Grant-in-Aid for Scientific Research (B), 26280066. ...
doi:10.21437/odyssey.2016-37
dblp:conf/odyssey/ShiotaVYOEM16
fatcat:vqx5n3rowbdxbjbniki7iqh5yq
Voice liveness detection using phoneme-based pop-noise detector for speaker verification
2018
Odyssey 2018 The Speaker and Language Recognition Workshop
This paper proposes a phoneme-based pop-noise (PN) detection algorithm for voice liveness detection (VLD) and automatic speaker verification systems. ...
A principle mechanism of almost all spoofing attacks is to replay recorded speeches via a loudspeaker. ...
Acknowledgements This work was supported in part by Grant-in-Aid for Scientists Research (B), 26280066.
References ...
doi:10.21437/odyssey.2018-33
dblp:conf/odyssey/MochizukiSK18
fatcat:bcvt43flkfduljxfjufzqer35e
A Continuous Liveness Detection System for Text-independent Speaker Verification
[article]
2021
arXiv
pre-print
In this paper, we propose VoiceLive, a liveness detection system for both text-dependent and text-independent voice authentication on smartphones. ...
However, recent studies show that voice authentication is vulnerable to replay attacks, where an adversary can spoof a voice authentication system using a pre-recorded voice sample collected from the victim ...
Wang et al. use the additional channel noise of the recording and loudspeaker for attack detection [39] . Chen et al. detect the magnetic fields of the loudspeaker to confirm a replay attack [14] . ...
arXiv:2106.01840v1
fatcat:oooi5sugorb7vd7kqyalx3g37i
VoiceLive
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
In this paper, we propose VoiceLive, a practical liveness detection system for voice authentication on smartphones. ...
attacks for liveness detection. ...
Nitesh Saxena, and the anonymous reviewers for their insightful feedbacks. ...
doi:10.1145/2976749.2978296
dblp:conf/ccs/ZhangT0016
fatcat:spxg42uabfd3dedyrvzwoa22mm
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems
2018
2018 IEEE International Workshop on Information Forensics and Security (WIFS)
This type of attack is thus an urgent problem needing to be solved. Playback detector ASV module Authentication Speech enhancement Playback Re-recording Attacker Upload Download Online Offline ...
Since current playback detection models are almost always trained using genuine and playedback speech, it may be possible to degrade their performance by transforming the acoustic characteristics of the ...
Nguyen, the Graduate University for Advanced Studies (SOKENDAI), for comments on an earlier versions of the manuscript. ...
doi:10.1109/wifs.2018.8630764
dblp:conf/wifs/FangYESK18
fatcat:t42w6irmcnbmrhnqu67cbuk5ca
VOLERE: Leakage Resilient User Authentication Based on Personal Voice Challenges
2022
IEEE Transactions on Dependable and Secure Computing
for authentication. ...
In this paper, we propose a leakage resilient user authentication cloud service with privacy preservation based on random personal voice challenges, named VOLERE (VOice LEakage REsilient). ...
By applying the synthesized voiceprints for user authentication based on random personal voice challenges, it is resilient in the face of original normal voice leakage and can successfully resist replay ...
doi:10.1109/tdsc.2022.3147504
fatcat:njnondatlffkrdr6ikj2c2vmga
Introduction to Voice Presentation Attack Detection and Recent Advances
[article]
2019
arXiv
pre-print
Over the past few years significant progress has been made in the field of presentation attack detection (PAD) for automatic speaker recognition (ASV). ...
These show that ASV PAD remains an unsolved problem and that further attention is required to develop generalised PAD solutions which have potential to detect diverse and previously unseen spoofing attacks ...
Replay attacks incur channel noise from both the recording device and the loudspeaker used for replay and thus the detection of channel effects beyond those introduced by the recording device of the ASV ...
arXiv:1901.01085v1
fatcat:4dxlmlyflzgnjc7jic2fwm3s6e
Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems
[article]
2018
arXiv
pre-print
Since current playback detection models are almost always trained using genuine and played-back speech, it may be possible to degrade their performance by transforming the acoustic characteristics of the ...
neural network-based method. ...
Nguyen, the Graduate University for Advanced Studies (SOKENDAI), for comments on an earlier versions of the manuscript. ...
arXiv:1809.04274v2
fatcat:4ybwlcxienarldnd2lws7jyvha
Multi-factor segmentation for topic visualization and recommendation
2013
Proceedings of the 21st ACM international conference on Multimedia - MM '13
The focus of this thesis is on the performance of humans in detecting altered samples from replay, speech synthesis (TTS) and voice conversion (VC) systems. ...
The participants were asked to assess a series of recordings by first giving a binary evaluation ("authentic" or "altered") and then by specifying their level of confidence on a 5-point scale. ...
This choice was based upon the need for creating carefully controlled setups where variables can be changed one by one . ...
doi:10.1145/2502081.2508120
dblp:conf/mm/BhattPHIMMPS13
fatcat:lgu5czbhsrfw7asxdwv7klfz7m
Audio Replay Attack Detection in Automated Speaker Verification
2018
International Journal of Computer Applications
Automated Speaker Verification (ASV) systems are extensively used for authentication and verification measures. Countermeasures are developed for ASV systems to protect it from audio replay attacks. ...
Overall, the paper describes a generalized system capable to detection of replay attacks in known and unknown conditions. ...
Replay attacks are conducted by using a recording of a speaker"s voice which are replayed to the ASV system. ...
doi:10.5120/ijca2018916986
fatcat:25uuzg6a6fb7lixqdi2y3fguri
ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements
2018
Odyssey 2018 The Speaker and Language Recognition Workshop
The first competitive ASVspoof challenge held in 2015 focused on the assessment of countermeasures to protect ASV technology from voice conversion and speech synthesis spoofing attacks. ...
These support the analysis of replay detection performance and limits. ...
The first focused on developing countermeasures to defend against converted voice and synthetic speech spoofing attacks whereas the second focused on replay attacks. ...
doi:10.21437/odyssey.2018-42
dblp:conf/odyssey/DelgadoTSD18
fatcat:5az2p4oezjc5rmelh4tsfxerzi
Adversary Models for Mobile Device Authentication
[article]
2020
arXiv
pre-print
Unfortunately, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security. ...
Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods having been proposed and analyzed. ...
For instance, already a minimal e ort attack using voice impersonation (replay) might trick the system [47] . ...
arXiv:2009.10150v1
fatcat:hxdqh4hpqvg2dfwf54o7hggvnm
Personal Voice Assistant Security and Privacy--A Survey
2022
Proceedings of the IEEE
We also discuss work that looks at privacy implications; for example, work on management of recording Manuscript ...
We highlight established areas such as voice authentication (VA) and new areas such as acoustic Denial of Service (DoS) that deserve more attention. ...
This scenario is used to study replay attacks; to distinguish a voice signal from a human speaker and a replay from a loudspeaker. ...
doi:10.1109/jproc.2022.3153167
fatcat:hxnntjl3lnhabc37bn4y77wwhi
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
[article]
2020
arXiv
pre-print
The popularity of SR brings in serious security concerns, as demonstrated by recent adversarial attacks. ...
Last but not least, we show that four promising defense methods for adversarial attack from the speech recognition domain become ineffective on SRSs against FAKEBOB, which calls for more effective defense ...
Adversarial voices also need to be played via loudspeakers, hence liveness detection could be possibly used to detect them. ...
arXiv:1911.01840v2
fatcat:oruwokz2qngcff6kvwdngulej4
A Survey on Amazon Alexa Attack Surfaces
[article]
2021
arXiv
pre-print
We also discuss the potential mitigation solutions for each attack surface to better improve Alexa or other voice assistants in terms of security and privacy. ...
The success of Alexa is based on its effortless usability, but in turn, that has led to a lack of sufficient security. ...
Most loudspeakers inherently add distortions to original sounds while replaying them, making the overall power distribution over the audible frequency range show some uniformity and linearity. ...
arXiv:2102.11442v1
fatcat:kyo7jhjd2zen5o2ebd26wuj4na
« Previous
Showing results 1 — 15 out of 93 results