This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes.
First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum...
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods...