Digital speech watermarking for anti-spoofing attack in speaker recognition
This paper presents new method for improving the security of speaker recognition in case of spoofing attack. In the proposed technique, digital speech watermarking has been applied on speech signal to increase robustness. To achieve this purpose, watermark is embedded in claimed signal at transmissi...
| Main Authors: | Nematollahi, Mohammad Ali, Syed Mohamed, Syed Abdul Rahman Al-Haddad, C. Doraisamy, Shyamala, Ranjbari, M. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/68823/ http://psasir.upm.edu.my/id/eprint/68823/1/Digital%20speech%20watermarking%20for%20anti-spoofing%20attack%20in%20speaker%20recognition.pdf |
Similar Items
Robust digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
Semi-fragile digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
Digital speech watermarking for online speaker recognition systems
by: Nematollahi, Mohammad Ali
Published: (2015)
by: Nematollahi, Mohammad Ali
Published: (2015)
A method for speech watermarking in speaker verification
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2013)
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2013)
An overview of digital speech watermarking
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
Interacting video information via speech watermarking for mobile second screen in Android smartphone
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
Digital audio and speech watermarking based on the multiple discrete wavelets transform and singular value decomposition
by: Nematollahi, Mohammad Ali, et al.
Published: (2012)
by: Nematollahi, Mohammad Ali, et al.
Published: (2012)
Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
by: Nematollahi, Mohammad Ali, et al.
Published: (2017)
Blind digital speech watermarking based on Eigen-value quantization in DWT
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
by: Nematollahi, Mohammad Ali, et al.
Published: (2015)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Texture analysis using local ternary pattern for face anti-spoofing
by: Parveen, Sajida, et al.
Published: (2016)
by: Parveen, Sajida, et al.
Published: (2016)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
Digital image watermarking based on angle quantization in discrete contourlet transform
by: Najih, Abdulmawla, et al.
Published: (2017)
by: Najih, Abdulmawla, et al.
Published: (2017)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Speaker’s variabilities, technology and language issues that affect automatic speech and speaker recognition systems
by: Abushariah, Mohammad A. M., et al.
Published: (2011)
by: Abushariah, Mohammad A. M., et al.
Published: (2011)
Analysis of Malay Speech Recognition for Different Speaker Origins
by: Juan, Sarah Samson, et al.
Published: (2012)
by: Juan, Sarah Samson, et al.
Published: (2012)
Speaker Independent Speech Recognition Using Neural Network
by: Tan, Chin Luh
Published: (2004)
by: Tan, Chin Luh
Published: (2004)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Comparative analysis of different parameters used for optimization in the process of speaker and speech recognition using deep neural network
by: Natarajan, Sureshkumar, et al.
Published: (2022)
by: Natarajan, Sureshkumar, et al.
Published: (2022)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Al-Quran learning using mobile speech recognition:an overview
by: Kamarudin, Noraziahtulhidayu, et al.
Published: (2014)
by: Kamarudin, Noraziahtulhidayu, et al.
Published: (2014)
Phonetically rich and balanced speech corpus for Arabic speaker-independent continuous automatic speech recognition systems
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2010)
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2010)
IP spoofing defense: an introduction
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Arabic Speaker-Independent Continuous
Automatic Speech Recognition Based on a
Phonetically Rich and Balanced Speech Corpus
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2012)
by: Abushariah, Mohammad Abd-Alrahman Mahmoud, et al.
Published: (2012)
Malay speaker dependent digits recognition
with improved backpropagation
by: Ummu Salamah Mohamad,, et al.
Published: (2004)
by: Ummu Salamah Mohamad,, et al.
Published: (2004)
Malay speaker dependent digits recognition with improved backpropagation
by: Mohamad, Ummu Salamah, et al.
Published: (2004)
by: Mohamad, Ummu Salamah, et al.
Published: (2004)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Robust speech recognition using fusion techniques and adaptive filtering
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2009)
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2009)
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
A robust digital image watermarking using repetition codes
against common attacks
by: Hassan, Abdullahi Mohamud
Published: (2015)
by: Hassan, Abdullahi Mohamud
Published: (2015)
Isolated word speech recognition of the malay digits
by: Mohamad Nasir, Haidawati, et al.
Published: (2014)
by: Mohamad Nasir, Haidawati, et al.
Published: (2014)
The platform of spoof videos: The case of Tudou.com
by: Li, Siling
Published: (2012)
by: Li, Siling
Published: (2012)
Speaker recognition based on Hidden Markov Model
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
by: Shaikh Salleh, Sheikh Hussain, et al.
Published: (2000)
Speaker discriminability for visual speech modes
by: Kim, J., et al.
Published: (2009)
by: Kim, J., et al.
Published: (2009)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Narrative dissidence, spoof videos and alternative memory in China
by: Li, Siling
Published: (2015)
by: Li, Siling
Published: (2015)
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Natural speaker-independent Arabic speech recognition system based on Hidden Markov Models using Sphinx tools
by: Abushariah, Mohammad A. M., et al.
Published: (2010)
by: Abushariah, Mohammad A. M., et al.
Published: (2010)
Similar Items
-
Robust digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015) -
Semi-fragile digital speech watermarking for online speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2015) -
Digital speech watermarking for online speaker recognition systems
by: Nematollahi, Mohammad Ali
Published: (2015) -
A method for speech watermarking in speaker verification
by: Syed Mohamed, Syed Abdul Rahman Al-Haddad, et al.
Published: (2013) -
An overview of digital speech watermarking
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)