The existing approaches to detecting synthesized speech, based on the current issues of synthesizing voice sequences, are considered. The stages of the algorithm for detecting spoofing attacks on voice biometric systems are described, and its final workflow is presented. The research focuses mainly on detecting synthesized speech, as it is the most dangerous type of attacks. The authors designed a software application for an experimental study, present its structure and propose the detection synthesized speech algorithm. This algorithm uses mel-frequency and constant Q cepstral coefficients to extract speech features. A Gaussian mixture model is used to construct a user model. Convolutional neural network was chosen as a classifier to det...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...
The ability to employ automatic speaker verification systems without face-to-face contact makes them...
Development of countermeasures to detect attacks performed on speaker verification systems through p...
Within the past few decades, voice biometric technology has been integrated into almost every job fi...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
The performance of biometric systems based on automatic speaker recognition technology is severely d...
The performance of biometric systems based on automatic speaker recognition technology is severely d...
The performance of speaker recognition systems has considerably improved in the last decade. This is...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) ...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...
The ability to employ automatic speaker verification systems without face-to-face contact makes them...
Development of countermeasures to detect attacks performed on speaker verification systems through p...
Within the past few decades, voice biometric technology has been integrated into almost every job fi...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
The performance of biometric systems based on automatic speaker recognition technology is severely d...
The performance of biometric systems based on automatic speaker recognition technology is severely d...
The performance of speaker recognition systems has considerably improved in the last decade. This is...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
With the rapid development of intelligent speech technologies, automatic speaker verification (ASV) ...
Automatic speaker verification (ASV) systems are highly vul-nerable against spoofing attacks, also k...
The ability to employ automatic speaker verification systems without face-to-face contact makes them...
Development of countermeasures to detect attacks performed on speaker verification systems through p...