Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward

M Masood, M Nawaz, KM Malik, A Javed, A Irtaza… - Applied …, 2023 - Springer
Easy access to audio-visual content on social media, combined with the availability of
modern tools such as Tensorflow or Keras, and open-source trained models, along with …

Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures

A Khan, KM Malik, J Ryan, M Saravanan - Artificial Intelligence Review, 2023 - Springer
With the advent of automated speaker verification (ASV) systems comes an equal and
opposite development: malicious actors may seek to use voice spoofing attacks to fool those …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

A survey on the detection and impacts of deepfakes in visual, audio, and textual formats

R Mubarak, T Alsboui, O Alshaikh, I Inuwa-Dute… - IEEE …, 2023 - ieeexplore.ieee.org
In the rapidly evolving digital landscape, the generation of fake visual, audio, and textual
content poses a significant threat to the trust of society, political stability, and integrity of …

Audio deepfakes: A survey

Z Khanjani, G Watson, VP Janeja - Frontiers in Big Data, 2023 - frontiersin.org
A deepfake is content or material that is synthetically generated or manipulated using
artificial intelligence (AI) methods, to be passed off as real and can include audio, video …

Audio deepfake detection: A survey

J Yi, C Wang, J Tao, X Zhang, CY Zhang… - arXiv preprint arXiv …, 2023 - arxiv.org
Audio deepfake detection is an emerging active topic. A growing number of literatures have
aimed to study deepfake detection algorithms and achieved effective performance, the …

Voice spoofing detection through residual network, max feature map, and depthwise separable convolution

IY Kwak, S Kwag, J Lee, Y Jeon, J Hwang… - IEEE …, 2023 - ieeexplore.ieee.org
The goal of the “2019 Automatic Speaker Verification Spoofing and Countermeasures
Challenge”(ASVspoof) was to make it easier to create systems that could identify voice …

Twice attention networks for synthetic speech detection

C Chen, Y Song, B Dai, D Chen - Neurocomputing, 2023 - Elsevier
Automatic speaker verification (ASV) systems are highly vulnerable to synthetic speech
attack. And the artifacts are the key spoofing clue to distinguish real and synthetic speech. In …

Physiological-physical feature fusion for automatic voice spoofing detection

J Xue, H Zhou - Frontiers of Computer Science, 2023 - Springer
Biometric speech recognition systems are often subject to various spoofing attacks, the most
common of which are speech synthesis and speech conversion attacks. These spoofing …

Efficient attention branch network with combined loss function for automatic speaker verification spoof detection

AM Rostami, MM Homayounpour… - Circuits, Systems, and …, 2023 - Springer
Many endeavors have sought to develop countermeasure techniques as enhancements on
Automatic Speaker Verification (ASV) systems, in order to make them more robust against …