This article deals with a technique of voice forgery using the ALISP (Automatic Language Independent Speech Processing) approach. Such a technique allows to transform the voice of an arbitrary person (the impostor), forging the identity of another person (the client). Our goal is to demonstrate that an automatic speaker recognition system could be seriously… (More)
In this paper, we describe a technique to detect image tampering using two different methods. The first is based on the Bayer interpolation process and its consequences in the Fourier domain. The second uses artifacts of the JPEG compression and more particularly in the JPEG frame observable in the Fourier domain.
Natural speech is produced by the vocal organs of a particular talker. The acoustic features of the speech signal must therefore be correlated with the movements of the articulators (lips, jaw, tongue, velum,...). For instance, hearing impaired people (and not only them) improve their understanding of speech by lip reading. This chapter is an overview of… (More)
Virtual worlds are developing rapidly over the internet. They are visited by avatars and staffed with Embodied Conversational Agents (ECAs). An avatar is a representation of a physical person. Each person controls one or several avatars and usually receives feedback from the virtual world on an audiovisual display. Ideally, all senses should be used to feel… (More)