Audio Spoof Detection from Theory to Practical Application
Mohit Dua
Sold by AHA-BUCH GmbH, Einbeck, Germany
AbeBooks Seller since August 14, 2006
New - Hardcover
Condition: New
Ships from Germany to U.S.A.
Quantity: 2 available
Add to basketSold by AHA-BUCH GmbH, Einbeck, Germany
AbeBooks Seller since August 14, 2006
Condition: New
Quantity: 2 available
Add to basketNeuware - Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic user's account or if it genuinely originates from the declared user. Primarily used for person authentication, these systems strive to verify the speaker's claimed identity. Despite substantial technological advancements, recent testing has revealed persistent vulnerabilities to spoofing, commonly referred to as a spoof attack. Various techniques such as mimicry, replay, text to speech (TTS), and voice conversion (VC) are frequently used in ASV systems to execute logical access (LA) or physical access (PA) spoofing attacks. To protect an ASD system from these attacks, many researchers have proposed effective security models as countermeasures. In addition, numerous review papers by different researchers have discussed various countermeasures developed to secure ASD systems. However, there is a notable absence of an authored book that comprehensively addresses this critical research topic, encompassing frontend, backend, dataset, and types of attacks considerations. Therefore, there is an urgent need for a book that can serve as a valuable resource for upcoming researchers, offering insights into securing ASD systems and bridging the existing gap in the literature. Hence, this book represents an effort by the authors in that direction.
Seller Inventory # 9781032910536
Audio Spoof Detection (ASD) systems play a pivotal role in evaluating whether the input speech signal has been manipulated by an imposter attempting unauthorized access to an authentic user's account or if it genuinely originates from the declared user. Primarily used for person authentication, these systems strive to verify the speaker's claimed identity. Despite substantial technological advancements, recent testing has revealed persistent vulnerabilities to spoofing, commonly referred to as a spoof attack. Various techniques such as mimicry, replay, text to speech (TTS), and voice conversion (VC) are frequently used in ASV systems to execute logical access (LA) or physical access (PA) spoofing attacks. To protect an ASD system from these attacks, many researchers have proposed effective security models as countermeasures. In addition, numerous review papers by different researchers have discussed various countermeasures developed to secure ASD systems. However, there is a notable absence of an authored book that comprehensively addresses this critical research topic, encompassing frontend, backend, dataset, and types of attacks considerations. Therefore, there is an urgent need for a book that can serve as a valuable resource for upcoming researchers, offering insights into securing ASD systems and bridging the existing gap in the literature. Hence, this book represents an effort by the authors in that direction.
Mohit Dua earned his Ph.D. in Automatic Speech Recognition from the National Institute of Technology, Kurukshetra, India, in 2018. He is presently working as an assistant professor in the Department of Computer Engineering at NIT Kurukshetra, India. He has more than 17 years of teaching and research experience. He is a member of Institute of Electrical and Electronics Engineers (IEEE), and life member of the Computer Society of India (CSI) and Indian Society for Technical Education (ISTE). His research interests include speech processing, chaos-based cryptography, information security, theory of formal languages, statistical modelling and natural language processing. He has published approximately 100+ research papers including abroad paper presentations in the USA, Canada, Australia, Singapore, Mauritius, and Dubai.
Nidhi Chakravarty earned her Ph.D. in Audio Spoof Detection from the National Institute of Technology, Kurukshetra, India, in 2024. She is presently working as an assistant professor in the Department of Computer Science and Engineering at Thapar Institute of Engineering and Technology, Patiala, India. She has published approximately 20+ research papers in various reputed journals and international conferences.
Shelza Dua earned her Ph.D. in Image Encryption from Banasthali Vidyapith, Banasthali Rajasthan, India, in 2019. She is presently working as a research associate in the Department of Electrical Engineering at NIT Kurukshetra, India. She has more than 20+ years of teaching and research experience. She is a life member of IETE. Her research interests include chaos-based cryptography and image encryption. She has published approximately 30+ research papers in various reputed journals and international conferences.
"About this title" may belong to another edition of this title.
General Terms and Conditions and Customer Information / Privacy Policy
I. General Terms and Conditions
§ 1 Basic provisions
(1) The following terms and conditions apply to all contracts that you conclude with us as a provider (AHA-BUCH GmbH) via the Internet platforms AbeBooks and/or ZVAB. Unless otherwise agreed, the inclusion of any of your own terms and conditions used by you will be objected to
(2) A consumer within the meaning of the following regulations is any natural person who concludes...
We ship your order after we received them
for articles on hand latest 24 hours,
for articles with overnight supply latest 48 hours.
In case we need to order an article from our supplier our dispatch time depends on the reception date of the articles, but the articles will be shipped on the same day.
Our goal is to send the ordered articles in the fastest, but also most efficient and secure way to our customers.
| Order quantity | 30 to 40 business days | 7 to 14 business days |
|---|---|---|
| First item | US$ 73.65 | US$ 85.31 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.