Completed local binary pattern based speech anti-spoofing
In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion, an anti-spoofing method based on completed local binary pattern (CLBP) was ...
Jian XU +5 more
doaj +2 more sources
The Impact of Silence on Speech Anti-Spoofing
16 pages, 9 figures, 13 ...
Yuxiang Zhang +5 more
openaire +2 more sources
Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference
The global navigation satellite system has achieved great success in the civil and military fields and is an important resource for space-time information services.
Long Huang +6 more
doaj +1 more source
The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A. +3 more
core +1 more source
A study on data augmentation in voice anti-spoofing
In this paper, we perform an in-depth study of how data augmentation techniques improve synthetic or spoofed audio detection. Specifically, we propose methods to deal with channel variability, different audio compressions, different band-widths, and unseen spoofing attacks, which have all been shown to significantly degrade the performance of audio ...
Ariel Cohen 0004 +3 more
openaire +2 more sources
BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication
Due to openness and lack of authentication, like other members of the Global Navigation Satellite System (GNSS) Club, BeiDou-II civilian navigation signals are vulnerable to all kinds of spoofing attacks.
Zhijun Wu, Yun Zhang, Rusen Liu
doaj +1 more source
Anti-spoofing Methods for Automatic SpeakerVerification System
Growing interest in automatic speaker verification (ASV)systems has lead to significant quality improvement of spoofing attackson them. Many research works confirm that despite the low equal er-ror rate (EER) ASV systems are still vulnerable to spoofing ...
Lavrentyeva, Galina +2 more
core +1 more source
Online Adaptive Personalization for Face Anti-Spoofing
Face authentication systems require a robust anti-spoofing module as they can be deceived by fabricating spoof images of authorized users. Most recent face anti-spoofing methods rely on optimized architectures and training objectives to alleviate the distribution shift between train and test users.
Davide Belli +3 more
openaire +2 more sources
A Kernel Density Estimation Based Loss Function and its Application to ASV-Spoofing Detection
Biometric systems are exposed to spoofing attacks which may compromise their security, and voice biometrics, also known as automatic speaker verification (ASV), is no exception.
Alejandro Gomez-Alanis +2 more
doaj +1 more source
Foundations of GNSS Spoofing Detection and Mitigation with Distributed GNSS SDR Receiver [PDF]
GNSS spoofing is an intentional and malicious action aimed at degrading and suppressing GNSS Positioning, Navigation, and Timing (PNT) services. Since it affects data and information segment of GNSS, it is considered a GNSS information (cyber-) security ...
Mia Filic
doaj +1 more source

