Audio Spoof Detection from Theory to Practical Application
CRC Press (Verlag)
978-1-032-91053-6 (ISBN)
- Noch nicht erschienen (ca. Juni 2026)
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
Mohit Dua: He received Ph.D. in the area of Automatic Speech Recognition from National Institute of Technology, Kurukshetra, India in 2018. He is presently working as Assistant Professor in Department of Computer Engineering at NIT Kurukshetra, India. He has more than 17 years of Teaching and Research experience. He is a member of Institute of Electrical and Electronics Engineers (IEEE), and life member of Computer Society of India (CSI) and Indian Society for Technical Education (ISTE). His research interests include Speech processing, Chaos based Cryptography, Information Security, Theory of Formal languages, Statistical modelling and Natural Language Processing. He has published approximately 100+ research papers including abroad paper presentations including USA, Canada, Australia, Singapore, Mauritius and Dubai. Nidhi Chakravarty: She received Ph.D. in the area of Audio Spoof Detection from National Institute of Technology, Kurukshetra, India in 2024. She is presently working as Assistant Professor in Department of Computer Science and Engineering at Thapar Institute of Engineering and Technology, Patiala, India. She has published approximately 20+ research papers in various reputed journals and international conferences. Shelza Dua: She received Ph.D. in the area of Image Encryption from Banasthali Vidyapith, Banasthali Rajasthan, India in 2019. She is presently working as Research Associate in Department of Electrical Engineering at NIT Kurukshetra, India. She has more than 20+ years of Teaching and Research experience. She is a life member of IETE Her research interests include Chaos based Cryptography and Image Encryption. She has published approximately 30+ research papers in various reputed journals and international conferences.
Chapter 1: Introduction. 1.1 Background. 1.2 Definition. 1.3 History. 1.4 Real and Fake Audio. 1.5 Emerging Threats in Voice-Based Fraud. 1.6 How AI Voice Scams are taking place. 1.8 Book Organization. Chapter 2: Audio Signal Processing. 2.1 Human Hearing. 2.2 Anatomy of the Auditory System. 2.3 How We Hear. 2.4 Psychoacoustics: The Science of Sound Perception. 2.5 What are filters?. 2.6 Hearing and Sound Waves. 2.7 Basic Qualities of Sound. 2.8 Digital Audios. 2.9 Audio Preprocessing Techniques. 2.10 Application of Audio Processing. 2.11 Attacks on ASV. 2.12 Conclusion. Chapter 3: Feature extraction. 3.1 Introduction. 3.2 Fundamentals of Audio Signal Processing. 3.3 Taxonomy of Audio Features. 3.4 Perceptual Features. 3.5 Statistical and Temporal Features. 3.6 Challenges in Audio Feature Extraction. 3.7 Future Trends. 3.8 Conclusion. Chapter 4: Backend Classification. 4.1 Introduction. 4.2 Backend Classification Strategies for Automatic Spoofing Detection. 4.3 Conclusion. Chapter 5: Attacks on ASV System. 5.1 Introduction. 5.2 History of Spoof Attack. 5.3 Fake Audio Generation. 5.4 Attacks on ASV. 5.5 Conclusion. Chapter 6: Data Augmentation. 6.1 Introduction. 6.2 Data Augmentation Techniques. 6.3 Applications of Data Augmentation in Speech Processing. 6.4 Conclusion. Chapter 7: Evaluation Metrics. 7.1 Introduction. 7.2 Overview of Evaluation Metrics. 7.3 Conclusion. Chapter 8: Datasets in Audio Spoof Detection. 8.1 Introduction. 8.2 Dataset Characteristics. 8.3 Datasets. 8.4 Dataset Generation Techniques. 8.5 Challenges in Audio Spoof Detection Dataset Design. 8.6 Future Directions for Dataset Development. 8.7 Conclusion. Chapter 9: Recent Trends and Open Issues. 9.1 Generalization and Application of the Proposed Work. 9.2 Suggestions for Future Work. Chapter 10: Implementation of the ASD system using python. 10.1 Introduction. 10.2 System Requirements. 10.3 Dataset Handling. 10.4 Feature Extraction. 10.5 Machine Learning and Deep Learning Models for Audio Classification. 10.6 Conclusion.
| Erscheint lt. Verlag | 1.6.2026 |
|---|---|
| Zusatzinfo | 20 Tables, black and white; 67 Line drawings, black and white; 56 Halftones, black and white; 123 Illustrations, black and white |
| Verlagsort | London |
| Sprache | englisch |
| Maße | 156 x 234 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Technik ► Nachrichtentechnik | |
| ISBN-10 | 1-032-91053-4 / 1032910534 |
| ISBN-13 | 978-1-032-91053-6 / 9781032910536 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich