Protecting Your Voice from Speech Synthesis Attacks.
Zihao LiuYan ZhangChenglin MiaoPublished in: ACSAC (2023)
Keyphrases
- speech synthesis
- text to speech
- speech recognition
- prosodic features
- vocal tract
- protection mechanisms
- unauthorized access
- countermeasures
- malicious attacks
- security threats
- speech corpus
- traffic analysis
- automatic speech recognition
- malicious users
- bayesian networks
- neural network
- security protocols
- personal data
- security risks
- watermarking algorithm
- watermarking scheme
- digital images
- pattern recognition
- image processing