2014 Ieee Region 10 Symposium 2014
DOI: 10.1109/tenconspring.2014.6863080
|View full text |Cite
|
Sign up to set email alerts
|

Digital speech watermarking for anti-spoofing attack in speaker recognition

Abstract: This paper presents new method for improving the security of speaker recognition in case of spoofing attack. In the proposed technique, digital speech watermarking has been applied on speech signal to increase robustness. To achieve this purpose, watermark is embedded in claimed signal at transmission side and then it is sent through the unsecure channel. In receiver side, watermark is extracted as proof of authentication. The results shows that digital speech watermarking can successfully apply for anti-spoof… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Although there has been much research on these technologies for use in various applications (e.g., for assisting individuals with vocal disabilities), they can also be used for vocal identity falsification such as in spoofing attacks against ASV systems, representing a serious personal security issue [8,9,10]. This has led to the recent emergence of research on the definition and development of countermeasures for detecting spoofing attacks [11,12,13,14]. Typically, three different types of these attacks are considered: replay, speech synthesis, and voice conversion.…”
Section: Introductionmentioning
confidence: 99%
“…Although there has been much research on these technologies for use in various applications (e.g., for assisting individuals with vocal disabilities), they can also be used for vocal identity falsification such as in spoofing attacks against ASV systems, representing a serious personal security issue [8,9,10]. This has led to the recent emergence of research on the definition and development of countermeasures for detecting spoofing attacks [11,12,13,14]. Typically, three different types of these attacks are considered: replay, speech synthesis, and voice conversion.…”
Section: Introductionmentioning
confidence: 99%
“…However, such technologies can be used to falsify profiles or identities and perform spoofing attacks against ASV systems, representing a serious challenge to the successful operation of these systems [9][10][11]. Research on the definition and development of countermeasures for the detection of spoofing attacks already exists [12][13][14][15]. Conventionally, attacks of three different natures are considered: replay, speech synthesis, and voice conversion.…”
Section: Introductionmentioning
confidence: 99%
“…Eight potential cracks are available which made online speaker recognition systems vulnerable [2]. Recently, speech watermarking is used to secure the communication channel against intentional and unintentional attacks for speaker verification and identification purpose [3][4][5][6][7]. For this reason, the watermark is embedded to verify the authenticity of the transmitter (i.e., sensor and feature extractors) and the integrity of the entire authentication mechanism.…”
Section: Introductionmentioning
confidence: 99%