In this paper, the importance of analytic phase of the speech signal in automatic speaker verification systems is demonstrated in the context of replay spoof attacks. In order to accurately detect the replay spoof attacks, effective feature representations of speech signals are required to capture the distortion introduced due to the intermediate playback/recording devices, which is convolutive in nature. Since the convolutional distortion in time-domain translates to additive distortion in the phase-domain, we propose to use IFCC features extracted from the analytic phase of the speech signal. The IFCC features contain information from both clean speech and distortion components. The clean speech component has to be subtracted in order to ...
International audienceAutomatic speaker verification is susceptible to various manipulations and spo...
The objective of this paper is to establish the importance of phase of analytic signal of speech, re...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
Replay attacks are attempts to get fraudulent access to an automatic speaker verification system. In...
Part 9: Pattern RecognitionInternational audienceWith the development of speech technology, various ...
Replay attack refers to the use of recorded speech in an attempt to spoof an automatic speaker verif...
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) ...
In our everyday lives, we communicate with each other using several means and channels of communicat...
With the growing number of voice-controlled devices, it is necessary to address the potential vulner...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Replay attacks are the simplest form of spoofing attacks on automatic speaker verification (ASV) sys...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
Among various physiological and behavioural traits, speech has gained popularity as an effective mod...
International audienceAutomatic speaker verification is susceptible to various manipulations and spo...
The objective of this paper is to establish the importance of phase of analytic signal of speech, re...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
Replay attacks are attempts to get fraudulent access to an automatic speaker verification system. In...
Part 9: Pattern RecognitionInternational audienceWith the development of speech technology, various ...
Replay attack refers to the use of recorded speech in an attempt to spoof an automatic speaker verif...
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) ...
In our everyday lives, we communicate with each other using several means and channels of communicat...
With the growing number of voice-controlled devices, it is necessary to address the potential vulner...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Replay attacks are the simplest form of spoofing attacks on automatic speaker verification (ASV) sys...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
Among various physiological and behavioural traits, speech has gained popularity as an effective mod...
International audienceAutomatic speaker verification is susceptible to various manipulations and spo...
The objective of this paper is to establish the importance of phase of analytic signal of speech, re...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...