Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice

The vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep S...

Full description

Bibliographic Details
Main Authors: Krzysztof Milewski, Szymon Zaporowski, Andrzej Czyżewski
Format: Article
Language:English
Published: MDPI AG 2023-10-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/21/4458