A review of deep learning techniques for speech processing

A Mehrish, N Majumder, R Bharadwaj, R Mihalcea… - Information …, 2023 - Elsevier
The field of speech processing has undergone a transformative shift with the advent of deep
learning. The use of multiple processing layers has enabled the creation of models capable …

Noise robust automatic speaker verification systems: review and analysis

S Joshi, M Dua - Telecommunication Systems, 2024 - Springer
Like any other biometric systems, Automatic Speaker Verification (ASV) systems are also
vulnerable to the spoofing attacks. Hence, it is important to develop the countermeasures in …

A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction

CB Tan, MHA Hijazi, N Khamis… - Multimedia Tools and …, 2021 - Springer
The emergence of biometric technology provides enhanced security compared to the
traditional identification and authentication techniques that were less efficient and secure …

An empirical study on channel effects for synthetic voice spoofing countermeasure systems

Y Zhang, G Zhu, F Jiang, Z Duan - arXiv preprint arXiv:2104.01320, 2021 - arxiv.org
Spoofing countermeasure (CM) systems are critical in speaker verification; they aim to
discern spoofing attacks from bona fide speech trials. In practice, however, acoustic …

A dataset of histograms of original and fake voice recordings (H-Voice)

DM Ballesteros, Y Rodriguez, D Renza - Data in brief, 2020 - pmc.ncbi.nlm.nih.gov
This paper presents H-Voice, a dataset of 6672 histograms of original and fake voice
recordings obtained by the Imitation [1, 2] and the Deep Voice [3] methods. The dataset is …

Beyond silence: Bias analysis through loss and asymmetric approach in audio anti-spoofing

H Shim, M Sahidullah, J Jung, S Watanabe… - arXiv preprint arXiv …, 2024 - arxiv.org
Current trends in audio anti-spoofing detection research strive to improve models' ability to
generalize across unseen attacks by learning to identify a variety of spoofing artifacts. This …

A robust intelligent fault diagnosis method for rolling bearings based on deep convolutional neural network and domain adaptation

J Xu, J Huang, Y Zhao, L Zhou - Procedia Computer Science, 2020 - Elsevier
At present, it is difficult for the deep neural network based fault diagnosis to obtain
satisfactory fault classification accuracy when the labeled fault data is insufficient under …

Evolutionary fusion of classifiers trained on linear prediction based features for replay attack detection

B Nasersharif, M Yazdani - Expert Systems, 2021 - Wiley Online Library
Recently, linear prediction analysis (LP) related features have been successfully used for
replay attack detection due to the imperfection in the LP‐based signal produced by …

Generalizing Voice Presentation Attack Detection to Unseen Synthetic Attacks and Channel Variation

Y Zhang, F Jiang, G Zhu, X Chen, Z Duan - Handbook of Biometric Anti …, 2023 - Springer
Abstract Automatic Speaker Verification (ASV) systems aim to verify a speaker's claimed
identity through voice. However, voice can be easily forged with replay, text-to-speech (TTS) …

Thech. Report: Genuinization of Speech waveform PMF for speaker detection spoofing and countermeasures

I Lapidot, JF Bonastre - arXiv preprint arXiv:2310.05534, 2023 - arxiv.org
In the context of spoofing attacks in speaker recognition systems, we observed that the
waveform probability mass function (PMF) of genuine speech differs significantly from the …