Search
Now showing items 1-3 of 3
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ...
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)
Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ...
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ...
Share this page