Database dependence comparison in detection of physical access voice spoofing attacks.
Manuel ChicaAlejandro Gómez AlanísEros RoselloAngel M. GomezJosé A. GonzálezAntonio M. PeinadoPublished in: IberSPEECH (2022)
Keyphrases
- database
- databases
- microsoft access
- object detection
- access control
- database management systems
- detection algorithm
- attack detection
- database access
- false alarms
- automatic detection
- database systems
- detection rate
- data model
- data sets
- anomaly detection
- data management
- database applications
- false positives
- query language
- query interface
- countermeasures
- biometric systems
- relational databases