Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Muhammed Kilic"'
Publikováno v:
IEEE Access, Vol 12, Pp 117523-117540 (2024)
Automatic Speaker Verification systems are prone to various voice spoofing attacks such as replays, voice conversion (VC) and speech synthesis. Malicious users can perform specific tasks such as controlling the bank account of someone, taking control
Externí odkaz:
https://doaj.org/article/f27de7eb10ab433e9b97f31ffc02a8e5
Malicious individuals can modify speech recordings with advanced audio editing software to create forged audio. The most common forgery method, known as audio copy-move forgery, involves copying part of the audio to duplicate or delete a segment. Con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e2e6464e581be155de469e751bd50a2e
https://doi.org/10.21203/rs.3.rs-2534047/v1
https://doi.org/10.21203/rs.3.rs-2534047/v1
Publikováno v:
2022 15th International Conference on Information Security and Cryptography (ISCTURKEY).