2020
DOI: 10.1016/j.patrec.2020.07.009
|View full text |Cite
|
Sign up to set email alerts
|

Security in smart cities: A brief review of digital forensic schemes for biometric data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 61 publications
(28 citation statements)
references
References 29 publications
0
26
0
2
Order By: Relevance
“…In this work, we demonstrate DeepTalk's ability to reliably model the vocal style of a given speaker and transfer it to a synthetic speech with high fidelity. While this technique can improve the user-experience of Speech Generating Devices (SGD) [24] and digital voice assistants, several concerns are raised by its potential misuse for creating Deep-Fake speech. For example, in the past, DeepFake speech has been used to mimic an influential person's voice for defrauding [25].…”
Section: Ethical Implicationsmentioning
confidence: 99%
“…In this work, we demonstrate DeepTalk's ability to reliably model the vocal style of a given speaker and transfer it to a synthetic speech with high fidelity. While this technique can improve the user-experience of Speech Generating Devices (SGD) [24] and digital voice assistants, several concerns are raised by its potential misuse for creating Deep-Fake speech. For example, in the past, DeepFake speech has been used to mimic an influential person's voice for defrauding [25].…”
Section: Ethical Implicationsmentioning
confidence: 99%
“…Actually, most of the times, the work done by researchers on audio forensics addresses the problem of audio tampering. Ross, Banerjee, & Chowdhury (Ross et al, 2020) explained content-based audio manipulation techniques and the corresponding forensic detection methods, due to their direct impact on the biometric utility of the audio data that might affect the security in smart cities. They clarified how Digital audio manipulation can be deployed at multiple stages of audio production from audio recording such as tampering the sensor to audio editing where certain audio editing techniques such as butt splicing and copy-move forgery can be applied, thereby, compromising audio integrity.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Metode penelitian dalam makalah ini yaitu dengan melakukan analisa komparasi antara suara barang bukti rekaman yang telah dimodifikasi oleh pelaku dengan suara pembanding asli [12], [13]. Skema penelitian digambarkan sebagai berikut: Berdasarkan data pada tabel 1 diketahui bahwa terdapat perbedaan nilai statistik pitch antara barang bukti dengan suara subjek walaupun tidak signifikan, artinya jika dilihat dari nilai minimum, maksimum, mean dan standar deviasi memiliki nilai statistik yang berbeda dan tidak identik.…”
Section: A Metode Forensikunclassified