all InfoSec news
The PartialSpoof Database and Countermeasures for the Detection of Short Generated Audio Segments Embedded in a Speech Utterance. (arXiv:2204.05177v2 [eess.AS] UPDATED)
April 29, 2022, 1:20 a.m. | Lin Zhang, Xin Wang, Erica Cooper, Nicholas Evans, Junichi Yamagishi
cs.CR updates on arXiv.org arxiv.org
Automatic speaker verification is susceptible to various manipulations and
spoofing, such as text-to-speech (TTS) synthesis, voice conversion (VC),
replay, tampering, and so on. In this paper, we consider a new spoofing
scenario called "Partial Spoof" (PS) in which synthesized or transformed audio
segments are embedded into a bona fide speech utterance. While existing
countermeasures (CMs) can detect fully spoofed utterances, there is a need for
their adaptation or extension to the PS scenario to detect utterances in which
only a …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Lead Product Security Engineer
@ Baker Hughes | IN-KA-BANGALORE-NEON BUILDING WEST TOWER
Penetration Tester
@ BT Group | Hemel Hempstead: Riverside (R6, Hemel Hempstead, United Kingdom
Cloud and Infrastructure Security Engineer II
@ StubHub | Los Angeles, CA