• Login
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorKamble, Madhu R. (1)Patel, Tanvina (1)Shah, Nirmesh J. (1)Subject
    Voice Conversion (3)
    ASV Systems (1)Automatic Speaker Verification (ASV) systems (1)ELU (1)Energy Separation Algorithm (1)Frequency warping (1)Fujisaki Model (1)Gabor Teager Filterbank (1)GAN (1)INCA (1)... View MoreDate Issued2017 (1)2019 (1)2021 (1)Has File(s)Yes (3)

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-3 of 3

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Design of countermeasures for spoofed speech detection system 

    Patel, Tanvina (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
    Automatic Speaker Verification (ASV) systems are vulnerable to speech synthesisand voice conversion techniques due to spoofing attacks.Recently, to encourage thedevelopment of anti-spoofing measures or countermeasures for ...
    Thumbnail

    Voice conversion: alignment and mapping perspective 

    Shah, Nirmesh J. (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
    Understanding how a particular speaker is producing speech, and mimicking one's voice is a difficult research problem due to the sophisticated mechanism involved in speech production. Voice Conversion (VC) is a technique ...
    Thumbnail

    Design of spoof speech detection system : teager energy-based approach 

    Kamble, Madhu R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
    Automatic Speaker Verification (ASV) systems are vulnerable to various spoofing attacks, namely, Speech Synthesis (SS), Voice Conversion (VC), Replay, and Impersonation. The study of spoofing countermeasures has become ...

    Resource Centre copyright © 2006-2017 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     


    Resource Centre copyright © 2006-2017 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV