Jetzt bestellen : Schweizerische Zivilprozessordnung (Art. 1–352 ZPO sowie Art. 400–408 ZPO)

Audio Spoof Detection from Theory to Practical Application

Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic user's account or if it genuinely originates from the declared user. Primarily used for person authentication, these systems strive to verify the speaker's claimed identity. Despite substantial technological advancements, recent testing has revealed persistent vulnerabilities to spoofing, commonly referred to as a spoof attack. Various techniques such as mimicry, replay, text to speech (TTS), and voice conversion (VC) are frequently employed in ASV systems to execute logical access (LA) or physical access (PA) spoofing attacks. To secure an ASD system from these attacks many researchers have proposed effective security models as countermeasures. In addition, numerous review papers by different researchers have discussed various countermeasures developed to secure ASD systems. However, there is a notable absence of an authored book that comprehensively addresses this critical research topic, encompassing frontend, backend, dataset and types of attacks considerations. Therefore, there is an urgent need for a book that serves as a valuable resource for upcoming researchers, offering insights into securing ASD systems and bridging the existing gap in the literature. Hence, this book is an effort by the authors in such direction.

Mai 2026, ca. 244 Seiten, Englisch
Taylor and Francis
978-1-032-91264-6

Weitere Titel zum Thema