Web: http://arxiv.org/abs/2204.05177

April 29, 2022, 1:20 a.m. | Lin Zhang, Xin Wang, Erica Cooper, Nicholas Evans, Junichi Yamagishi

cs.CR updates on arXiv.org arxiv.org

Automatic speaker verification is susceptible to various manipulations and
spoofing, such as text-to-speech (TTS) synthesis, voice conversion (VC),
replay, tampering, and so on. In this paper, we consider a new spoofing
scenario called "Partial Spoof" (PS) in which synthesized or transformed audio
segments are embedded into a bona fide speech utterance. While existing
countermeasures (CMs) can detect fully spoofed utterances, there is a need for
their adaptation or extension to the PS scenario to detect utterances in which
only a …

countermeasures database detection embedded

More from arxiv.org / cs.CR updates on arXiv.org

Security Engineer I, Offensive Security Penetration Testing

@ Amazon.com | US, TX, Virtual Location - Texas

Cyber Security Engineer

@ GWA Group | Derrimut, Victoria, Australia

Threat Intelligence Consultant- Remote (Anywhere in the U.S.)

@ GuidePoint Security LLC | Remote

Senior Cloud Security Engineer

@ Reddit | Atlanta, GA

Information Security Officer

@ Vix Technology | Cambridge, England, United Kingdom

Information Security Manager (12m FTC)

@ PlayStation Global | United Kingdom, London

Vulnerability Management Engineer (Qualys)

@ Aperia | Dallas, Texas, United States - Remote

Information Security Officer (US)

@ Form3 | 100% Remote - New York

Information Systems Security Officer (ISSO)

@ Spry Methods | Denver, CO

Client Manager - Cybersecurity - Nashville Enterprise

@ Optiv | Nashville, TN

Threat Analyst | Remote, USA

@ Optiv | Minneapolis, MN

Senior Cyber Security SME

@ Node.Digital | Dulles, Virginia, United States