Exploration of Source and Filter Information for the Detection of Replay Attacks in Speaker Verification
dc.contributor.author | Jelil, Sarfaraz | |
dc.date.accessioned | 2025-04-07T10:05:28Z | |
dc.date.available | 2025-04-07T10:05:28Z | |
dc.date.issued | 2025 | |
dc.description | Supervisors: Sinha, Rohit and Prasanna, S R Mahadeva | |
dc.description.abstract | Automatic speaker verification (ASV) is defined as the task of accepting or rejecting an identity claim of a speaker based on their speech. ASV systems are prone to different kinds of spoofing attacks where the system is presented with a spoofed speech signal instead of a speech signal from a genuine speaker. These spoofing attacks can be a serious threat to an ASV system as they can increase false acceptance rates and negatively impact the performance of the system. Hence, it becomes essential to detect these spoofing attacks and protect the security of an ASV system. This thesis deals with a specific kind of spoofing attack called the replay attack. A replay attack is performed by secretly recording the speech of a genuine user of an ASV system and playing it back to the system to obtain unauthorized access. | |
dc.identifier.other | ROLL NO.156102027 | |
dc.identifier.uri | https://gyan.iitg.ac.in/handle/123456789/2851 | |
dc.language.iso | en | |
dc.relation.ispartofseries | TH-3576 | |
dc.title | Exploration of Source and Filter Information for the Detection of Replay Attacks in Speaker Verification | |
dc.type | Thesis |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed to upon submission
- Description: