Abstract | ||
---|---|---|
While having a wide range of applications, automatic speaker verification (ASV) systems are vulnerable to spoofing attacks, in particular, replay attacks that are effective and easy to implement. Most prior work on detecting replay attacks uses audio from a single acoustic microphone only, leading to difficulties in detecting high-end replay attacks close to indistinguishable from live human speec... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TASLP.2017.2760243 | IEEE/ACM Transactions on Audio, Speech, and Language Processing |
Keywords | Field | DocType |
Microphones,Speech,Acoustics,Robustness,Speech processing,Security | Speech processing,Spoofing attack,Computer science,Speech recognition,Robustness (computer science),Throat microphone,Replay attack,Mixture model,Microphone,Liveness | Journal |
Volume | Issue | ISSN |
26 | 1 | 2329-9290 |
Citations | PageRank | References |
4 | 0.41 | 48 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Md. Sahidullah | 1 | 326 | 24.99 |
Dennis Alexander Lehmann Thomsen | 2 | 4 | 0.41 |
Rosa González Hautamäki | 3 | 30 | 3.87 |
Tomi Kinnunen | 4 | 1323 | 86.67 |
Zheng-Hua Tan | 5 | 457 | 60.32 |
Robert Parts | 6 | 4 | 0.41 |
Martti Pitkänen | 7 | 4 | 0.41 |