Nothing Special   »   [go: up one dir, main page]

Tan et al., 2021 - Google Patents

A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction

Tan et al., 2021

View HTML
Document ID
6151989018898041947
Author
Tan C
Hijazi M
Khamis N
Nohuddin P
Zainol Z
Coenen F
Gani A
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/6292Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00126Access control not involving the use of a pass
    • G07C9/00134Access control not involving the use of a pass in combination with an identity-check
    • G07C9/0015Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/68Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
    • G06K9/6807Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries
    • G06K9/6842Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries according to the linguistic properties, e.g. English, German

Similar Documents

Publication Publication Date Title
Tan et al. A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
Kamble et al. Advances in anti-spoofing: from the perspective of ASVspoof challenges
Sahidullah et al. Introduction to voice presentation attack detection and recent advances
Wu et al. ASVspoof: the automatic speaker verification spoofing and countermeasures challenge
Mukhopadhyay et al. All your voices are belong to us: Stealing voices to fool humans and machines
Huang et al. Audio replay spoof attack detection by joint segment-based linear filter bank feature extraction and attention-enhanced DenseNet-BiLSTM network
Adiban et al. Replay spoofing countermeasure using autoencoder and siamese networks on ASVspoof 2019 challenge
Zhao et al. Multi-task learning-based spoofing-robust automatic speaker verification system
Khan et al. Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures
Khan et al. Voice spoofing countermeasures: Taxonomy, state-of-the-art, experimental analysis of generalizability, open challenges, and the way forward
Himawan et al. Deep domain adaptation for anti-spoofing in speaker verification systems
Folorunso et al. A review of voice-base person identification: state-of-the-art
Ranjan et al. Statnet: Spectral and temporal features based multi-task network for audio spoofing detection
Ali et al. Fake audio detection using hierarchical representations learning and spectrogram features
Mubeen et al. Detection of impostor and tampered segments in audio by using an intelligent system
Kumar et al. Deepfakes audio detection techniques using deep convolutional neural network
Akdeniz et al. Detecting audio copy-move forgery with an artificial neural network
Saleema et al. Voice biometrics: the promising future of authentication in the internet of things
Park et al. User authentication method via speaker recognition and speech synthesis detection
Basit et al. SDI: A tool for speech differentiation in user identification
Garg et al. Voice liveness detection under feature fusion and cross-environment scenario
Chen et al. Forensic identification for electronic disguised voice based on supervector and statistical analysis
Mankad et al. Towards development of smart and reliable voice based personal assistants
Yang et al. Dual-branch network with fused Mel features for logic-manipulated speech detection
Feng et al. SHNU anti-spoofing systems for asvspoof 2019 challenge