Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition.
Wenhan YaoJiangkun YangYongqiang HeJia LiuWeiping WenPublished in: CoRR (2024)
Keyphrases
- speech recognition
- watermarking algorithm
- watermarking technique
- countermeasures
- hidden markov models
- watermarking scheme
- speech processing
- speech recognizer
- speaker identification
- language model
- speech signal
- automatic speech recognition
- speech synthesis
- data hiding
- noisy environments
- pattern recognition
- jpeg compression
- audio signal
- speech recognition technology
- security risks
- security vulnerabilities
- speech recognition systems
- speaker adaptation
- signal processing
- speech understanding
- speaker recognition
- information security
- speech recognizers
- speaker diarization
- keyword spotting
- speaker independent
- neural network
- isolated word
- image processing
- data mining