Results 31 to 40 of about 4,892 (195)

Completed local binary pattern based speech anti-spoofing

open access: yesDianxin kexue, 2021
In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion, an anti-spoofing method based on completed local binary pattern (CLBP) was ...
Jian XU   +5 more
doaj   +2 more sources

The Impact of Silence on Speech Anti-Spoofing

open access: yesIEEE/ACM Transactions on Audio, Speech, and Language Processing, 2023
16 pages, 9 figures, 13 ...
Yuxiang Zhang   +5 more
openaire   +2 more sources

Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference

open access: yesRemote Sensing, 2022
The global navigation satellite system has achieved great success in the civil and military fields and is an important resource for space-time information services.
Long Huang   +6 more
doaj   +1 more source

The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]

open access: yes, 2012
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A.   +3 more
core   +1 more source

A study on data augmentation in voice anti-spoofing

open access: yesSpeech Communication, 2022
In this paper, we perform an in-depth study of how data augmentation techniques improve synthetic or spoofed audio detection. Specifically, we propose methods to deal with channel variability, different audio compressions, different band-widths, and unseen spoofing attacks, which have all been shown to significantly degrade the performance of audio ...
Ariel Cohen 0004   +3 more
openaire   +2 more sources

BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication

open access: yesIEEE Access, 2020
Due to openness and lack of authentication, like other members of the Global Navigation Satellite System (GNSS) Club, BeiDou-II civilian navigation signals are vulnerable to all kinds of spoofing attacks.
Zhijun Wu, Yun Zhang, Rusen Liu
doaj   +1 more source

Anti-spoofing Methods for Automatic SpeakerVerification System

open access: yes, 2017
Growing interest in automatic speaker verification (ASV)systems has lead to significant quality improvement of spoofing attackson them. Many research works confirm that despite the low equal er-ror rate (EER) ASV systems are still vulnerable to spoofing ...
Lavrentyeva, Galina   +2 more
core   +1 more source

Online Adaptive Personalization for Face Anti-Spoofing

open access: yes2022 IEEE International Conference on Image Processing (ICIP), 2022
Face authentication systems require a robust anti-spoofing module as they can be deceived by fabricating spoof images of authorized users. Most recent face anti-spoofing methods rely on optimized architectures and training objectives to alleviate the distribution shift between train and test users.
Davide Belli   +3 more
openaire   +2 more sources

A Kernel Density Estimation Based Loss Function and its Application to ASV-Spoofing Detection

open access: yesIEEE Access, 2020
Biometric systems are exposed to spoofing attacks which may compromise their security, and voice biometrics, also known as automatic speaker verification (ASV), is no exception.
Alejandro Gomez-Alanis   +2 more
doaj   +1 more source

Foundations of GNSS Spoofing Detection and Mitigation with Distributed GNSS SDR Receiver [PDF]

open access: yesTransNav, 2018
GNSS spoofing is an intentional and malicious action aimed at degrading and suppressing GNSS Positioning, Navigation, and Timing (PNT) services. Since it affects data and information segment of GNSS, it is considered a GNSS information (cyber-) security ...
Mia Filic
doaj   +1 more source

Home - About - Disclaimer - Privacy