2006
DOI: 10.1016/j.specom.2006.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Speaker verification security improvement by means of speech watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0
2

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 9 publications
0
24
0
2
Order By: Relevance
“…Since neither microphone level nor transmission level attacks necessarily require system-level access, they are the most easily implemented attacks and are thus the greatest threat to typical ASV systems (Faundez-Zanuy et al, 2006). They are accordingly the focus in the remainder of this paper.…”
Section: Possible Attack Pointsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since neither microphone level nor transmission level attacks necessarily require system-level access, they are the most easily implemented attacks and are thus the greatest threat to typical ASV systems (Faundez-Zanuy et al, 2006). They are accordingly the focus in the remainder of this paper.…”
Section: Possible Attack Pointsmentioning
confidence: 99%
“…In the specific case of ASV as illustrated in Figure 1, attacks at both the microphone and transmission levels are generally considered to pose the greatest threat (Faundez-Zanuy et al, 2006). Here, an adversary, typically referred to as an impostor, might seek to deceive the system by impersonating another enrolled user at the microphone in order to manipulate the ASV result.…”
Section: Introductionmentioning
confidence: 99%
“…As pointed out in [11,45], spoofing attacks can take place at two locations in a speaker verification system: at the microphone sensor and during the transmission of the acquired speech signal. At the sensor level, an impostor, also called an adversary, could compromise the system by replaying a pre-recorded speech signal or impersonating the target speaker at the sensor.…”
Section: Vulnerability Of Speaker Verification To Attacksmentioning
confidence: 99%
“…However, the systems can be protected and secured against these attacks by time stamps and watermarking. Recently, speech watermarking has been used to secure communication channels for speaker verification and identification against both intentional and unintentional attacks [3][4][5][6]. For this purpose, the watermark is embedded to verify both the authenticity of the transmitter (i.e., using sensor and feature extractors) and the integrity of the entire authentication mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…However, these techniques can seriously degrade speaker recognition performance. Also, watermarking and speaker recognition systems have opposing goals whenever the signal-to-watermark ratio (SWR) is reduced and the robustness of the watermark is increased, and the speaker identification and verification performance can be reduced [3][4][5]10]. Some researchers therefore apply semi-fragile watermarking methods to reduce the effects on recognition performance [11].…”
Section: Introductionmentioning
confidence: 99%