2015
DOI: 10.1016/j.dsp.2015.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Verification of hidden speaker behind transformation disguised voices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The local audio feature information of pure and reverberant audio signals is well characterized by correlation due to the input building of time and frequency, while the complex nonlinear relationship between pure and reverberant speech is characterized by model building using DCNN architecture, which is a good trade-off between network complexity and training gradient decline. The experimental results show good results in speech quality recognition and speech translation capability improvement compared with the fully connected network-based architecture.In 2015, Wu et al [18] held the first speech recognition competition and released the first statistical analysis system (SAS) database designed for faked speech recognition research [19]. The competition successfully eliminated the audio forgery effect using the modified Mel frequency cepstrum coefficient (MFCC) and performed speaker identification on the speech after the forgery effect was eliminated [20].…”
Section: Related Workmentioning
confidence: 99%
“…The local audio feature information of pure and reverberant audio signals is well characterized by correlation due to the input building of time and frequency, while the complex nonlinear relationship between pure and reverberant speech is characterized by model building using DCNN architecture, which is a good trade-off between network complexity and training gradient decline. The experimental results show good results in speech quality recognition and speech translation capability improvement compared with the fully connected network-based architecture.In 2015, Wu et al [18] held the first speech recognition competition and released the first statistical analysis system (SAS) database designed for faked speech recognition research [19]. The competition successfully eliminated the audio forgery effect using the modified Mel frequency cepstrum coefficient (MFCC) and performed speaker identification on the speech after the forgery effect was eliminated [20].…”
Section: Related Workmentioning
confidence: 99%
“…Despite the fact that this practice may present threats to security, few efforts have been reported on the recognition of hidden speakers from such disguised voices. Wang et al (31) proposed countermeasures to erase the disguise effects and verify the speaker's identity from voice transformation disguised voices. The reported results of this proposed system stated that when countermeasures were adopted, the verification performances showed significant improvement with Equal Error Rate (EER) lowered to 3%-4%.…”
Section: Published Work In the Year 2015mentioning
confidence: 99%