2021 International Conference on Artificial Intelligence (ICAI) 2021
DOI: 10.1109/icai52203.2021.9445259
|View full text |Cite
|
Sign up to set email alerts
|

Spoofed Voice Detection using Dense Features of STFT and MDCT Spectrograms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Another approach [13] utilizes the Short-Time-Fourier transform (STFT) and a new convolutional neural network for lung cancer diagnosis from spectrochemical analysis. Similarly but in a different domain, in [16] authors utilize a deep neural network to detect audio operations using two types of transform techniques: STFT and Modified Discrete Transform. They improve audio authentication for forensics, successfully recognizing spoofed voices with high accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Another approach [13] utilizes the Short-Time-Fourier transform (STFT) and a new convolutional neural network for lung cancer diagnosis from spectrochemical analysis. Similarly but in a different domain, in [16] authors utilize a deep neural network to detect audio operations using two types of transform techniques: STFT and Modified Discrete Transform. They improve audio authentication for forensics, successfully recognizing spoofed voices with high accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…Although there are many audio tamper detection methods, the technology using electronic network frequency ENF is widely used in multimedia forensics (Zakariah et al, 2018). Although ENF is ideally a sinusoidal signal that oscillates at a nominal frequency, the actual ENF signal will fluctuate slightly with the change of energy supply and the load of the power grid (Saleem et al, 2021). When a segment is inserted or deleted from a recording, the ENF of that segment also changes.…”
Section: Research On Tamper Detection Based On Electronic Network Fre...mentioning
confidence: 99%
“…Chen (Chen et al, 2016) detects tampered audio in the time domain through discrete wavelet packet decomposition and singularity analysis of speech signals for audio tampering operations of insertion and deletion. Saleem (Saleem et al, 2021) inputted the Short-Time Fourier transform (STFT) and Modified Discrete Cosine Transform (MDCT) spectra of audio into the convolutional neural network to identify Spoofed Voices. There is also much research on copy-move Forgery of the copy-paste type.…”
Section: Research On Tamper Detection Based On Audio Speech Contentmentioning
confidence: 99%
“…The undetectable manipulation of digital speech avatars poses substantial threats to judicial processes, political fields, and social security. Contemporary speech forensics techniques are pivotal in ensuring the integrity of digital avatars and focus on detecting tampering facilitated by audio editing software, such as deletion, insertion, copy and move, splicing, resampling and recompression of audio clips [4][5][6][7]. It is worth noting that in the field of speech content forensics, there are more forensic methods for speech deletion, copy and move, splicing, and other tampering approaches [8][9][10], while there are relatively few methods for speech resampling forensics, and these tampering means are often accompanied by resampling operations.…”
Section: Introductionmentioning
confidence: 99%