Introduction to voice presentation attack detection and recent advances

M Sahidullah, H Delgado, M Todisco, A Nautsch… - Handbook of Biometric …, 2023 - Springer
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …

Who is real bob? adversarial attacks on speaker recognition systems

G Chen, S Chenb, L Fan, X Du, Z Zhao… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or
identification mechanism. The popularity of SR brings in serious security concerns, as …

Your microphone array retains your identity: A robust voice liveness detection system for smart speakers

Y Meng, J Li, M Pillari, A Deopujari, L Brennan… - 31st USENIX Security …, 2022 - usenix.org
Though playing an essential role in smart home systems, smart speakers are vulnerable to
voice spoofing attacks. Passive liveness detection, which utilizes only the collected audio …

Secure mmWave-radar-based speaker verification for IoT smart home

Y Dong, YD Yao - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Voice assistant devices function as interaction gateways in the Internet-of-Things (IoT) smart
home. By using voice assistants, users are able to control smart homes via speech …

The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification

C Yan, Y Long, X Ji, W Xu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Verifying the identity of voice inputs is important as voices are increasingly used for sensitive
operations. Traditional methods focus on differentiating individuals via the spectrographic …

Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array

Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan… - Proceedings of the 2021 …, 2021 - dl.acm.org
With the popularity of intelligent audio systems in recent years, their vulnerabilities have
become an increasing public concern. Existing studies have designed a set of machine …

Antifake: Using adversarial audio to prevent unauthorized speech synthesis

Z Yu, S Zhai, N Zhang - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The rapid development of deep neural networks and generative AI has catalyzed growth in
realistic speech synthesis. While this technology has great potential to improve lives, it also …

Lightweight video-based respiration rate detection algorithm: An application case on intensive care

X Tan, M Hu, G Zhai, Y Zhu, W Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The video-based non-contact respiration detection technology can be used in many
application scenarios to unobtrusively and ubiquitously monitor the physical state of living …

[PDF][PDF] Deep siamese architecture based replay detection for secure voice biometric.

K Sriskandaraja, V Sethu, E Ambikairajah - Interspeech, 2018 - isca-archive.org
Replay attacks are the simplest and the most easily accessible form of spoofing attacks on
voice biometric systems and can be hard to detect by systems designed to identify spoofing …

JTubeSpeech: corpus of Japanese speech collected from YouTube for speech recognition and speaker verification

S Takamichi, L Kürzinger, T Saeki, S Shiota… - arXiv preprint arXiv …, 2021 - arxiv.org
In this paper, we construct a new Japanese speech corpus called" JTubeSpeech." Although
recent end-to-end learning requires large-size speech corpora, open-sourced such corpora …