首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
[A] As might be expected, countermeasures to sniff out such deception are being developed. Nuance Communications, a maker of voi
[A] As might be expected, countermeasures to sniff out such deception are being developed. Nuance Communications, a maker of voi
admin
2018-06-06
17
问题
[A] As might be expected, countermeasures to sniff out such deception are being developed. Nuance Communications, a maker of voice-activated software, is working on algorithms that detect tiny skips in frequency at the points where slices of speech are stuck together. Adobe, best known as the maker of Photoshop, an image-editing software suite, says that it may encode digital watermarks into speech fabricated by a voice-cloning feature called VoCo it is developing. Such wizardry may help computers flag up suspicious speech. Even so, it is easy to imagine the mayhem that might be created in a world which makes it easy to put authentic-sounding words into the mouths of adversaries—be they colleagues or heads of state.
[B] Until recently, voice cloning—or voice banking, as it was then known—was a bespoke industry which served those at risk of losing the power of speech to cancer or surgery. Creating a synthetic copy of a voice was a lengthy and pricey process. It meant recording many phrases, each spoken many times, with different emotional emphases and in different contexts (statement, question, command and so forth), in order to cover all possible pronunciations.
[C] More troubling, any voice—including that of a stranger—can be cloned if decent recordings are available on YouTube or elsewhere. Researchers at the University of Alabama, Birmingham, led by Nitesh Saxena, were able to use Festvox to clone voices based on only five minutes of speech retrieved online. When tested against voice-biometrics software like that used by many banks to block unauthorised access to accounts, more than 80% of the fake voices tricked the computer. Alan Black, one of Festvox’s developers, reckons systems that rely on voice-ID software are now "deeply, fundamentally insecure".
[D] Next year VivoText plans to release an app that lets users select the emphasis, speed and level of happiness or sadness with which individual words and phrases are produced. Mr Silbert refers to the emotive quality of the human voice as "the ultimate instrument". Yet this power also troubles him. VivoText licenses its software to Hasbro, an American toymaker keen to sell increasingly interactive playthings. Hasbro is aware, Mr Silbert notes, that without safeguards a prankster might, for example, type curses on his mother’s smartphone in order to see a younger sibling burst into tears on hearing them spoken by a toy using mum’s voice.
[E] Not anymore. Software exists that can store slivers of recorded speech a mere five milliseconds long, each annotated with a precise pitch. These can be shuffled together to make new words, and tweaked individually so that they fit harmoniously into their new sonic homes. This is much cheaper than conventional voice banking, and permits novel uses to be developed.
[F] Utter 160 or so French or English phrases into a phone app developed by Candy Voice, a new Parisian company, and the app’s software will reassemble tiny slices of those sounds to enunciate, in a plausible simulacrum of your own dulcet tones, whatever typed words it is subsequently fed. In effect, the app has cloned your voice. The result still sounds a little synthetic but Candy Voice’s boss, Jean-Luc Crébouw, reckons advances in the firm’s algorithms will render it increasingly natural. Similar software for English and four widely spoken Indian languages, developed under the name of Festvox, by Carnegie Mellon University’s Language Technologies Institute, is also available.
[G] And, lest people get smug about the inferiority of machines, humans have proved only a little harder to fool than software is. Dr Saxena and his colleagues asked volunteers if a voice sample belonged to a person whose real speech they had just listened to for about 90 seconds. The volunteers recognised cloned speech as such only half the time (i. e. no better than chance). The upshot, according to George Papcun, an expert witness paid to detect faked recordings produced as evidence in court, is the emergence of a technology with "enormous potential value for disinformation". Dr Papcun, who previously worked as a speech-synthesis scientist at Los Alamos National Laboratory, ponders on things like the ability to clone an enemy leader’s voice in wartime.
【B5】
选项
答案
A
解析
上述三段为新科技的优势及弊端,故下文应指出新科技该如何扬长避短,或者怎样解决新科技的弊端问题。A项段内容指出,已有机构在开发一些精湛的技术来识别这类骗术,故为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/Xx6Z777K
0
考研英语一
相关试题推荐
Couldyoursmartphonepreventacarfromhittingyou?GeneralMotorsandotherresearchersthinkthat’sapossibility【C1】______a
Couldyoursmartphonepreventacarfromhittingyou?GeneralMotorsandotherresearchersthinkthat’sapossibility【C1】______a
Asageneralrule,AmericanmenearnmorethanAmericanwomen.Thisholdstrueacrossindustries,acrosseducationlevels,anda
Asageneralrule,AmericanmenearnmorethanAmericanwomen.Thisholdstrueacrossindustries,acrosseducationlevels,anda
Asageneralrule,AmericanmenearnmorethanAmericanwomen.Thisholdstrueacrossindustries,acrosseducationlevels,anda
Nowadays,amateurphotographyhasbecomeatroublingissue.Citizensofrichcountrieshavegotusedtobeingwatchedbyclosed-
We’vebeenhearingaboutitforyears,butthebooklesslibraryhasfinallyarrived,firstappearingoncollegecampuses.AtDre
We’vebeenhearingaboutitforyears,butthebooklesslibraryhasfinallyarrived,firstappearingoncollegecampuses.AtDre
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswe
随机试题
一名从医院抽调支援社区核酸检测的医务人员,从凌晨4点开始,穿上厚厚的防护服,为社区群众采集核酸。队伍排了几百米远,人挤人,人紧挨着人,还能听见人们之间相互抱怨天气冷、重复检测,检测速度慢的声音,此时,该医务人员如何做最为妥当?
铣削不锈钢这种难加工材料时,铣刀寿命通常确定为__________min。
口腔健康调查项目中健康状况项目不包括
某患者因剧烈腹痛到乡卫生院就诊,因医生诊断、治疗错误,造成该患者功能障碍,经县医疗事故鉴定委员会鉴定为“三级医疗事故”。其家属对鉴定结论持有异议,认为应属“二级医疗事故”。该事故进一步处理解决的正确程序是
根据《建设工程工程量清单计价规范》(GB50500--2013),关于其他项目清单的编制和计价,下列说法正确的是()。
制成品市场一般都属于垄断竞争类型。()
技术风险与操作风险源头中的“技术”的区分。
在动态博弈战略行动中,只有当局人从实施某一威胁所能获得的总收益()不实施该威胁所获得的总收益时,该威胁才是可信的。
人民警察不得从事的行为是()。
SQL语言集______、数据操纵、数据定义、数据控制功能于一体。
最新回复
(
0
)