Login / Signup
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks.
Artur Janicki
Federico Alegre
Nicholas W. D. Evans
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
speaker verification
countermeasures
speaker recognition
security mechanisms
noisy environments
security flaws
security vulnerabilities
security risks
audio visual
information security
security issues
prosodic features
attack scenarios
buffer overflow
face verification
multilayer perceptron
multi modal
multimedia