Search results for: ANTISPOOF ALGORITHMS
Found little results, maybe try searching with alternative method.
Search results for: ANTISPOOF ALGORITHMS
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...