115 research outputs found

    Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks

    Full text link
    Automatic Speaker Verification (ASV) systems are increasingly used in voice bio-metrics for user authentication but are susceptible to logical and physical spoofing attacks, posing security risks. Existing research mainly tackles logical or physical attacks separately, leading to a gap in unified spoofing detection. Moreover, when existing systems attempt to handle both types of attacks, they often exhibit significant disparities in the Equal Error Rate (EER). To bridge this gap, we present a Parallel Stacked Aggregation Network that processes raw audio. Our approach employs a split-transform-aggregation technique, dividing utterances into convolved representations, applying transformations, and aggregating the results to identify logical (LA) and physical (PA) spoofing attacks. Evaluation of the ASVspoof-2019 and VSDC datasets shows the effectiveness of the proposed system. It outperforms state-of-the-art solutions, displaying reduced EER disparities and superior performance in detecting spoofing attacks. This highlights the proposed method's generalizability and superiority. In a world increasingly reliant on voice-based security, our unified spoofing detection system provides a robust defense against a spectrum of voice spoofing attacks, safeguarding ASVs and user data effectively

    Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection

    Full text link
    The Automatic Speaker Verification (ASV) system is vulnerable to fraudulent activities using audio deepfakes, also known as logical-access voice spoofing attacks. These deepfakes pose a concerning threat to voice biometrics due to recent advancements in generative AI and speech synthesis technologies. While several deep learning models for speech synthesis detection have been developed, most of them show poor generalizability, especially when the attacks have different statistical distributions from the ones seen. Therefore, this paper presents Quick-SpoofNet, an approach for detecting both seen and unseen synthetic attacks in the ASV system using one-shot learning and metric learning techniques. By using the effective spectral feature set, the proposed method extracts compact and representative temporal embeddings from the voice samples and utilizes metric learning and triplet loss to assess the similarity index and distinguish different embeddings. The system effectively clusters similar speech embeddings, classifying bona fide speeches as the target class and identifying other clusters as spoofing attacks. The proposed system is evaluated using the ASVspoof 2019 logical access (LA) dataset and tested against unseen deepfake attacks from the ASVspoof 2021 dataset. Additionally, its generalization ability towards unseen bona fide speech is assessed using speech data from the VSDC dataset

    Organizational Determinants as a Barrier of Balanced Scorecard Adoption for Performance Measurement in Pakistan

    Get PDF
    The prime objective of this study was to identify the status of Balanced Scorecard (BSC) adoption in Pakistan and to what extent different organizational factors serve as barrier in the strategic adoption of BSC as administrative tool to measure performance of organizations. Different organizational theories, strategic adoption, innovation diffusion theory and general system theory were reviewed and to develop theoretical framework these theories were considered as starting point. The literature related to these theories aided in the development of four hypotheses. All organizations of Pakistan irrespective of type, nature and location were selected to test the hypotheses. These organizations were selected by systematic random sampling and a sample of 287 was calculated from a sampling frame taken from Karachi Stock Exchange. After pretesting the adapted instrument was furthermore validated through Cronbach alpha and factor analysis. The impact of different factors as barrier was tested through correlation and regression analysis. It was found through analysis that all four organizational factors were very strong barriers in the adoption of BSC. The salient nature of organizational factors supporting the resource based view in organization for strategic decision for adoption. Keywords: Organizational Performance, Balance Scorecard, organizational barriers

    ISO, As an Agent of Change for Manufacturing Sector: A Case Study from Pakistani Perspective

    Get PDF
    Purpose - The purpose and aim of this study is to investigate how and why any organization needs to become registered with ISO. The case is written especially for the students of business management to enhance their capabilities that help them when they go in practical life. Methodology and Approach - This study contains qualitative approach. Data required to write this paper was collected from direct meetings and by conducting interviews from relevant persons. Findings - This whole study concluded that if any organization wants to make their products up to mark and never having to say sorry to customer than they must follow the quality standards of ISO and needs to become register with it. Paper Limitation - This case study is self-reported. Name of organization and names of persons are supposed and these are not basis on truth. It does not consist actual events occurred in the organization. And this study is also limited by the fact that findings relate to only one country. Originality/value - This case study elaborates the complete understanding of how any organization can get ISO quality standards certification. Keywords - Bureau verities quality information, International organizations of standards, Quality, Quality manua

    Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward

    Full text link
    Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use them for spreading misinformation. Various countermeasures have been proposed to detect these spoofing attacks. Due to the extensive work done on spoofing detection in automated speaker verification (ASV) systems in the last 6-7 years, there is a need to classify the research and perform qualitative and quantitative comparisons on state-of-the-art countermeasures. Additionally, no existing survey paper has reviewed integrated solutions to voice spoofing evaluation and speaker verification, adversarial/antiforensics attacks on spoofing countermeasures, and ASV itself, or unified solutions to detect multiple attacks using a single model. Further, no work has been done to provide an apples-to-apples comparison of published countermeasures in order to assess their generalizability by evaluating them across corpora. In this work, we conduct a review of the literature on spoofing detection using hand-crafted features, deep learning, end-to-end, and universal spoofing countermeasure solutions to detect speech synthesis (SS), voice conversion (VC), and replay attacks. Additionally, we also review integrated solutions to voice spoofing evaluation and speaker verification, adversarial and anti-forensics attacks on voice countermeasures, and ASV. The limitations and challenges of the existing spoofing countermeasures are also presented. We report the performance of these countermeasures on several datasets and evaluate them across corpora. For the experiments, we employ the ASVspoof2019 and VSDC datasets along with GMM, SVM, CNN, and CNN-GRU classifiers. (For reproduceability of the results, the code of the test bed can be found in our GitHub Repository

    Role of Global Value Chains and Exchange Rate: An Empirical Examination in case of Pakistan

    Get PDF
    Pakistan’s economy has a history of facing continuous external sector shocks that often resulted in large exchange rate depreciations. Whether these depreciations have supported growth in exports from Pakistan or do more harm than providing any benefit to the economy is always a matter of domestic debate with inconclusive results. One major apprehension sighted in this regard is the role of intermediate imported goods that become expensive after depreciations and thus offset any competitive gains expected to be achieved from the exchange rate adjustment. To empirically investigate this argument, we evaluate that whether and how the Global Value Chains (GVCs) participation, i.e. the export and import of intermediate goods, affects the REER elasticity for exports in Pakistan using input-output model techniques. We find that, like elsewhere, REER elasticity of exports has declined in Pakistan overtime. However, only around 16 percent of this decline in REER elasticity is explained by the role of GVCs participation. One major reason for this lower impact could be coming from the fact that, unlike other emerging economies and in contrast to general perception, role of backward participation (i.e. use of imported inputs to produce exports) is one of the lowest in Pakistan. While the results still signify the role of PKR exchange rate in external adjustment, the low backward participation is not helping the exports to become competitive overtime

    The dark triad and counterproductive work behaviours: A multiple mediation analysis

    Get PDF
    Prior studies on the dark side of the organisation tend to overlook some important mediator(s) in the relationship between the dark triad personalities (D.T.P.s) and counterproductive work behaviour (C.W.B.). Hence, this study examines the multiple-mediation model by incorporating perceived organisational politics and perceived accountability in the relationship between D.T.P.s and C.W.B. The sample of 290 employees is selected through a random sampling technique from the hospitality industry. Partial least squares structural equation modelling (P.L.S.-S.E.M.) and bootstrapping are employed to examine the multiple-mediation model. The results show that perceived organisational politics and perceived accountability mediate the association of the D.T.P.s and C.W.B. Our findings provide policymakers with a vision into the existence of the D.T.P.s and their potential consequences for C.W.B. This study encourages decision-makers and practitioners to develop an ethical climate, job standards, and systems of accountability to achieve productive goals
    • …
    corecore