The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2021
DOI: 10.1016/j.compeleceng.2021.107122
|View full text |Cite
|
Sign up to set email alerts
|

Detection of impostor and tampered segments in audio by using an intelligent system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 19 publications
(33 reference statements)
0
4
0
Order By: Relevance
“…The results of up-sampling are fuse bottom-up generated feature maps of the same scale, that is, added pixel by pi the experiment, bilinear interpolation is selected for up-sampling. X is obtained attention module, which reduces the number of channels to 256 by 1 × 1 convo X′ through (6):…”
Section: Feature Fusionmentioning
confidence: 99%
See 1 more Smart Citation
“…The results of up-sampling are fuse bottom-up generated feature maps of the same scale, that is, added pixel by pi the experiment, bilinear interpolation is selected for up-sampling. X is obtained attention module, which reduces the number of channels to 256 by 1 × 1 convo X′ through (6):…”
Section: Feature Fusionmentioning
confidence: 99%
“…The undetectable manipulation of digital speech avatars poses substantial threats to judicial processes, political fields, and social security. Contemporary speech forensics techniques are pivotal in ensuring the integrity of digital avatars and focus on detecting tampering facilitated by audio editing software, such as deletion, insertion, copy and move, splicing, resampling and recompression of audio clips [4][5][6][7]. It is worth noting that in the field of speech content forensics, there are more forensic methods for speech deletion, copy and move, splicing, and other tampering approaches [8][9][10], while there are relatively few methods for speech resampling forensics, and these tampering means are often accompanied by resampling operations.…”
Section: Introductionmentioning
confidence: 99%
“…Dhiman et al [29] used GLCM and LBP for content-based image retrieval to apply to the CORAL dataset. Suleman et al [30] and Zeeshan et al [31] used contextual techniques to find similarities in 1D and 2D signals. Sukhjeet et al [32] used a hybrid approach which utilizes color space and quaternion moment vector to create this unique feature vector.…”
Section: State Of the Artmentioning
confidence: 99%
“…In addition to this, the use of other advanced technologies such as artificial intelligence (AI), big data analytics (BDA), machine learning (ML), and other emerging tools helped in utilizing collected data effectively through different sources in the network. Therefore, through this practice, the processed data can be used to improve system efficiency and performance [2,3]. To accomplish a highly interactive, efficient but secure network, various elements and factors such as data privacy, authentication, ease of use and maintenance, and high security standards against possible attacks are needed.…”
Section: Introductionmentioning
confidence: 99%