Tan et al., 2021 - Google Patents
A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future directionTan et al., 2021
View HTML- Document ID
- 6151989018898041947
- Author
- Tan C
- Hijazi M
- Khamis N
- Nohuddin P
- Zainol Z
- Coenen F
- Gani A
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
The emergence of biometric technology provides enhanced security compared to the traditional identification and authentication techniques that were less efficient and secure. Despite the advantages brought by biometric technology, the existing biometric systems …
- 238000001514 detection method 0 title abstract description 57
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/6292—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00126—Access control not involving the use of a pass
- G07C9/00134—Access control not involving the use of a pass in combination with an identity-check
- G07C9/0015—Access control not involving the use of a pass in combination with an identity-check by means of a handwritten signature
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
- G06K9/6807—Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries
- G06K9/6842—Dividing the references in groups prior to recognition, the recognition taking place in steps; Selecting relevant dictionaries according to the linguistic properties, e.g. English, German
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tan et al. | A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction | |
Kamble et al. | Advances in anti-spoofing: from the perspective of ASVspoof challenges | |
Sahidullah et al. | Introduction to voice presentation attack detection and recent advances | |
Wu et al. | ASVspoof: the automatic speaker verification spoofing and countermeasures challenge | |
Mukhopadhyay et al. | All your voices are belong to us: Stealing voices to fool humans and machines | |
Huang et al. | Audio replay spoof attack detection by joint segment-based linear filter bank feature extraction and attention-enhanced DenseNet-BiLSTM network | |
Adiban et al. | Replay spoofing countermeasure using autoencoder and siamese networks on ASVspoof 2019 challenge | |
Zhao et al. | Multi-task learning-based spoofing-robust automatic speaker verification system | |
Khan et al. | Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures | |
Khan et al. | Voice spoofing countermeasures: Taxonomy, state-of-the-art, experimental analysis of generalizability, open challenges, and the way forward | |
Himawan et al. | Deep domain adaptation for anti-spoofing in speaker verification systems | |
Folorunso et al. | A review of voice-base person identification: state-of-the-art | |
Ranjan et al. | Statnet: Spectral and temporal features based multi-task network for audio spoofing detection | |
Ali et al. | Fake audio detection using hierarchical representations learning and spectrogram features | |
Mubeen et al. | Detection of impostor and tampered segments in audio by using an intelligent system | |
Kumar et al. | Deepfakes audio detection techniques using deep convolutional neural network | |
Akdeniz et al. | Detecting audio copy-move forgery with an artificial neural network | |
Saleema et al. | Voice biometrics: the promising future of authentication in the internet of things | |
Park et al. | User authentication method via speaker recognition and speech synthesis detection | |
Basit et al. | SDI: A tool for speech differentiation in user identification | |
Garg et al. | Voice liveness detection under feature fusion and cross-environment scenario | |
Chen et al. | Forensic identification for electronic disguised voice based on supervector and statistical analysis | |
Mankad et al. | Towards development of smart and reliable voice based personal assistants | |
Yang et al. | Dual-branch network with fused Mel features for logic-manipulated speech detection | |
Feng et al. | SHNU anti-spoofing systems for asvspoof 2019 challenge |