Show simple item record

dc.contributor.authorPartila, Pavol
dc.contributor.authorTovárek, Jaromír
dc.contributor.authorIlk, Hakki Gokhan
dc.contributor.authorRozhon, Jan
dc.contributor.authorVozňák, Miroslav
dc.date.accessioned2020-04-26T11:52:13Z
dc.date.available2020-04-26T11:52:13Z
dc.date.issued2020
dc.identifier.citationIEEE Communications Magazine. 2020, vol. 58, issue 2, p. 100-105.cs
dc.identifier.issn0163-6804
dc.identifier.issn1558-1896
dc.identifier.urihttp://hdl.handle.net/10084/139440
dc.description.abstractThis article verifies the reliability of automatic speaker verification (ASV) systems on new synthesis methods based on deep neural networks. ASV systems are widely used and applied regarding secure and effective biometric authentication. On the other hand, the rapid deployment of ASV systems contributes to the increased attention of attackers with newer and more sophisticated spoofing methods. Until recently, speech synthesis of the reference speaker did not seriously compromise the latest ASV systems. This situation is changing with the deployment of deep neural networks into the synthesis process. Projects including WaveNet, Deep Voice, Voice Loop, and many others generate very natural and high-quality speech that may clone voice identity. We are slowly approaching an era where we will not be able to recognize a genuine voice from a synthesized one. Therefore, it is necessary to define the robustness of current ASV systems to new methods of voice cloning. In this article, well-known SVM and GMM as well as new CNN-based ASVs are applied and subjected to synthesized speech from Tacotron 2 with the WaveNet TTS system. The results of this work confirm our concerns regarding the reliability of ASV systems against synthesized speech.cs
dc.language.isoencs
dc.publisherIEEEcs
dc.relation.ispartofseriesIEEE Communications Magazinecs
dc.relation.urihttp://doi.org/10.1109/MCOM.001.1900396cs
dc.rightsCopyright © 2020, IEEEcs
dc.titleDeep learning serves voice cloning: How vulnerable are automatic speaker verification systems to spoofing trials?cs
dc.typearticlecs
dc.identifier.doi10.1109/MCOM.001.1900396
dc.type.statusPeer-reviewedcs
dc.description.sourceWeb of Sciencecs
dc.description.volume58cs
dc.description.issue2cs
dc.description.lastpage105cs
dc.description.firstpage100cs
dc.identifier.wos000521968600018


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record