2018
DOI: 10.1007/s11042-018-6834-3
|View full text |Cite
|
Sign up to set email alerts
|

Replay attack detection based on distortion by loudspeaker for voice authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…In addition to the aforementioned physical biometric traits, researchers have also studied the use of voice for user identification. The results demonstrated that an EER of 11.1% [12], true positive rate of 99.79%, and true negative rate of 99.75% [13] could be achieved. However, voice quality is affected by various user activities, such as running, or due to physical conditions such as sickness.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to the aforementioned physical biometric traits, researchers have also studied the use of voice for user identification. The results demonstrated that an EER of 11.1% [12], true positive rate of 99.79%, and true negative rate of 99.75% [13] could be achieved. However, voice quality is affected by various user activities, such as running, or due to physical conditions such as sickness.…”
Section: Related Workmentioning
confidence: 99%
“…Biometric recognition is a promising approach and has been accepted in academia and widely used in the industry. For example, many mobile devices now support user authorization with various biometric modalities, such as fingerprint scanning and face, voice, or iris recognition [3][4][5][6][7][8][9][10][11][12][13]. These modalities are examples of physiological biometrics; that is, user identification is based on the distinctive physical characteristics of a user obtained by using specialized hardware sensors.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, based on the textual contents of the speech data, voice recognition systems can be classified into two categories; Text-dependent, the identity claimer is expected to produce the same words as those pronounced during the enrollment; in this method, the speaker has to satisfy two conditions, knowing the word and being the rightful owner of the voice [2]. Textindependent, the user can speak freely during enrollment and verification phases [21].…”
Section: Text-dependentmentioning
confidence: 99%
“…The two steps are discussed in Section 2. Due to the portability, stability, and privacy of the voice features, voice recognition authentication has attracted extensive attention and application in recent years [2]. Voice recognition systems are versatile, simple to use, and non-intrusive by nature.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation