2023
DOI: 10.1007/978-981-19-5288-3_13
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Voice Presentation Attack Detection and Recent Advances

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 190 publications
0
2
0
Order By: Relevance
“…Despite the advantages synthetic speech offers, the rise of audio deepfakes presents a severe threat to our society and economy. Deepfake audio employs advanced deep learning techniques like Text-to-Speech (TTS) or Voice Conversion (VC) to generate sophisticated spoofed audio samples, which can be considered presentation attacks [1]. Such maliciously crafted artificial speech can deceive both Automatic speaker verification systems (ASV), posing a severe threat to the integrity and reliability of speaker verification processes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Despite the advantages synthetic speech offers, the rise of audio deepfakes presents a severe threat to our society and economy. Deepfake audio employs advanced deep learning techniques like Text-to-Speech (TTS) or Voice Conversion (VC) to generate sophisticated spoofed audio samples, which can be considered presentation attacks [1]. Such maliciously crafted artificial speech can deceive both Automatic speaker verification systems (ASV), posing a severe threat to the integrity and reliability of speaker verification processes.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the transferability nature across deep learning-based models [18], [19], adversarial samples are often retrieved from a surrogate (substitute) model to attack the target (supposedly similar) model. As announced by the ASVspoof organizers, ASVspoof5 competition 1 will shift the focus to VC and TTS, including adversarial attacks relying on ASV/CM feedback. The need to build resilient defense mechanisms has never been more urgent, and addressing these challenges requires our utmost attention.…”
Section: Introductionmentioning
confidence: 99%