2013
DOI: 10.1007/978-3-319-01931-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Examining Vulnerability of Voice Verification Systems to Spoofing Attacks by Means of a TTS System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Automatic speaker verification (ASV) systems aim at confirming a claimed speaker identity against a spoken utterance, which has been widely applied into commercial devices and authorization tools. However, it is also broadly noticed that malicious attacks can easily degrade a well-developed ASV system, and such attacks may be classified into impersonation [1], replay [1], voice conversion (VC) [2], text-to-speech [3] synthesis (TTS) and the recently emerged adversarial attacks [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Automatic speaker verification (ASV) systems aim at confirming a claimed speaker identity against a spoken utterance, which has been widely applied into commercial devices and authorization tools. However, it is also broadly noticed that malicious attacks can easily degrade a well-developed ASV system, and such attacks may be classified into impersonation [1], replay [1], voice conversion (VC) [2], text-to-speech [3] synthesis (TTS) and the recently emerged adversarial attacks [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…However, past research has shown that ASV systems are vulnerable to malicious attacks via spoofing and fake speech, such as imitated [1,2], replayed [2,3], synthetic [4,5] and converted [6] speech. These spoofing and fake speech are created to sound like the voice of the target person as much as possible.…”
Section: Introductionmentioning
confidence: 99%
“…Spoofing attacks on automatic speaker verification (ASV) have attracted ever-increasing security concerns in recent years, as they pose serious threats to essential applications of ASV, such as e-banking authentication, device activation, etc. These attacks can be categorized into human impersonation [1,2], audio replay [3,4], synthetic speech [5,6] and the recently emerged adversarial attacks [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%