Voice Comparison Approaches for Forensic Application: A Review

Kruthika S. G, Trisiladevi C. Nagavi, P. Mahesha
{"title":"Voice Comparison Approaches for Forensic Application: A Review","authors":"Kruthika S. G, Trisiladevi C. Nagavi, P. Mahesha","doi":"10.1109/ICSCCC58608.2023.10176553","DOIUrl":null,"url":null,"abstract":"Advancement in technology has led to various types of online security attacks and frauds. Evidences produced is in digital form and the field of analysis is called digital forensics. It focuses on identifying, acquiring and analyzing electronic evidence. However, there are many research works and techniques under the speech forensics domain such as Forensic Speaker Recognition (FSR) and Forensic Voice Comparison (FVC) for supporting the crime investigation. Within the broader domain of speech forensics, the paper focuses specifically on FVC, which adopts a trace sample to examine speech patterns in a recording of a known suspect voice. This article provides an overview of generic approach, traditional and semi-automated methods for FVC, including auditory, acoustic, phonetic, linguistic and spectrographic methods. In present scenario there are many automatic approach proposed using deep learning to identify the criminals using time and frequency domain methods. They present the efficient results and there is a scope for improvement with reference to FVC. The research also examines various challenges, applications and deliberations. Finally, the paper concludes with discussions and future directions.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCCC58608.2023.10176553","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Advancement in technology has led to various types of online security attacks and frauds. Evidences produced is in digital form and the field of analysis is called digital forensics. It focuses on identifying, acquiring and analyzing electronic evidence. However, there are many research works and techniques under the speech forensics domain such as Forensic Speaker Recognition (FSR) and Forensic Voice Comparison (FVC) for supporting the crime investigation. Within the broader domain of speech forensics, the paper focuses specifically on FVC, which adopts a trace sample to examine speech patterns in a recording of a known suspect voice. This article provides an overview of generic approach, traditional and semi-automated methods for FVC, including auditory, acoustic, phonetic, linguistic and spectrographic methods. In present scenario there are many automatic approach proposed using deep learning to identify the criminals using time and frequency domain methods. They present the efficient results and there is a scope for improvement with reference to FVC. The research also examines various challenges, applications and deliberations. Finally, the paper concludes with discussions and future directions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
语音比对法证应用方法综述
技术的进步导致了各种类型的网络安全攻击和欺诈。产生的证据是数字形式的,分析领域被称为数字取证。它侧重于识别、获取和分析电子证据。然而,在语音取证领域有许多支持犯罪侦查的研究工作和技术,如法医说话人识别(FSR)和法医语音比对(FVC)。在更广泛的语音取证领域,本文特别关注FVC,它采用跟踪样本来检查已知可疑语音记录中的语音模式。本文综述了FVC的一般方法、传统方法和半自动化方法,包括听觉、声学、语音、语言和光谱方法。在目前的情况下,人们提出了许多使用深度学习的自动方法,利用时域和频域方法来识别犯罪分子。他们提出了有效的结果,并有一个改进的范围,参考植被覆盖度。该研究还考察了各种挑战、应用和审议。最后,对本文的研究进行了总结和展望。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Ensuring Trust and Security in IoT Systems through Blockchain Integration Machine Learning Based Framework for Cryptocurrency Price Prediction Voice Comparison Approaches for Forensic Application: A Review A Review on Security Trends and Solutions Against Cyber Threats in Industry 4.0 An Analysis Of Anomaly Detection Techniques for IoT Devices: A Review
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1