An Investigation on Voice Mimicry Attacks to a Speaker Recognition System.
Donato ImpedovoAnnalisa LongoTonino PalmisanoLucia SarcinellaDavide VenetoPublished in: ITASEC (2022)
Keyphrases
- synthesized speech
- prosodic features
- automatic speech recognition systems
- speaker verification
- feature extraction
- mel frequency cepstral coefficients
- audio visual
- countermeasures
- speech recognition
- watermarking scheme
- emotion recognition
- speaker identification
- speaker recognition
- recognition process
- speaker independent
- speech sounds
- traffic analysis
- malicious users
- vector quantization
- attack detection
- terrorist attacks
- text to speech
- watermarking technique
- gaussian mixture model
- recognition algorithm
- data mining
- digital images
- malicious attacks
- security risks
- cryptographic protocols
- ddos attacks
- security protocols
- computer security
- security mechanisms