{"id":"https://openalex.org/W4396833689","doi":"https://doi.org/10.1145/3613904.3642817","title":"Uncovering Human Traits in Determining Real and Spoofed Audio: Insights from Blind and Sighted Individuals","display_name":"Uncovering Human Traits in Determining Real and Spoofed Audio: Insights from Blind and Sighted Individuals","publication_year":2024,"publication_date":"2024-05-11","ids":{"openalex":"https://openalex.org/W4396833689","doi":"https://doi.org/10.1145/3613904.3642817"},"language":"en","primary_location":{"id":"doi:10.1145/3613904.3642817","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642817","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642817","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642817","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035190493","display_name":"Chaeeun Han","orcid":"https://orcid.org/0000-0001-5275-7142"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chaeeun Han","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, United States"],"raw_orcid":"https://orcid.org/0000-0001-5275-7142","affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, United States","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009542542","display_name":"Prasenjit Mitra","orcid":"https://orcid.org/0000-0002-7530-9497"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Prasenjit Mitra","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, United States"],"raw_orcid":"https://orcid.org/0000-0002-7530-9497","affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, United States","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005834738","display_name":"Syed Masum Billah","orcid":"https://orcid.org/0000-0001-5063-3808"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Syed Masum Billah","raw_affiliation_strings":["College of Information Sciences and Technology, Pennsylvania State University, United States"],"raw_orcid":"https://orcid.org/0000-0001-5063-3808","affiliations":[{"raw_affiliation_string":"College of Information Sciences and Technology, Pennsylvania State University, United States","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5035190493"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":2.929,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.90777639,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10914","display_name":"Tactile and Sensory Interactions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T10914","display_name":"Tactile and Sensory Interactions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2805","display_name":"Cognitive Neuroscience"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12032","display_name":"Multisensory perception and integration","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7105863094329834},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6607763171195984},{"id":"https://openalex.org/keywords/audio-visual","display_name":"Audio visual","score":0.6428787708282471},{"id":"https://openalex.org/keywords/audio-signal-processing","display_name":"Audio signal processing","score":0.4476637840270996},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.42714419960975647},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3734515309333801},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.2774049639701843},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.20308849215507507},{"id":"https://openalex.org/keywords/speech-coding","display_name":"Speech coding","score":0.14271515607833862},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08858448266983032}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7105863094329834},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6607763171195984},{"id":"https://openalex.org/C3017588708","wikidata":"https://www.wikidata.org/wiki/Q758901","display_name":"Audio visual","level":2,"score":0.6428787708282471},{"id":"https://openalex.org/C127220857","wikidata":"https://www.wikidata.org/wiki/Q2719318","display_name":"Audio signal processing","level":4,"score":0.4476637840270996},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.42714419960975647},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3734515309333801},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.2774049639701843},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.20308849215507507},{"id":"https://openalex.org/C13895895","wikidata":"https://www.wikidata.org/wiki/Q3270773","display_name":"Speech coding","level":2,"score":0.14271515607833862},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08858448266983032}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3613904.3642817","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642817","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642817","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3613904.3642817","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642817","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642817","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5199999809265137,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[{"id":"https://openalex.org/G7804810424","display_name":null,"funder_award_id":"R01 LM013330","funder_id":"https://openalex.org/F4320332161","funder_display_name":"National Institutes of Health"}],"funders":[{"id":"https://openalex.org/F4320332161","display_name":"National Institutes of Health","ror":"https://ror.org/01cwqze88"},{"id":"https://openalex.org/F4320337372","display_name":"U.S. National Library of Medicine","ror":"https://ror.org/0060t0j89"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4396833689.pdf","grobid_xml":"https://content.openalex.org/works/W4396833689.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W607079072","https://openalex.org/W810030822","https://openalex.org/W2003560724","https://openalex.org/W2006586657","https://openalex.org/W2017708393","https://openalex.org/W2034720249","https://openalex.org/W2073953522","https://openalex.org/W2119322603","https://openalex.org/W2123299109","https://openalex.org/W2148154194","https://openalex.org/W2151727950","https://openalex.org/W2153051391","https://openalex.org/W2157298821","https://openalex.org/W2159591770","https://openalex.org/W2165267827","https://openalex.org/W2552992193","https://openalex.org/W2587891104","https://openalex.org/W2795676171","https://openalex.org/W2796069293","https://openalex.org/W3019547849","https://openalex.org/W3026777299","https://openalex.org/W3102100346","https://openalex.org/W3135413014","https://openalex.org/W3173253285","https://openalex.org/W3184222954","https://openalex.org/W3212886388","https://openalex.org/W4212857348","https://openalex.org/W4292828895","https://openalex.org/W4311737082","https://openalex.org/W4384525266","https://openalex.org/W4385782354"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W3153057489","https://openalex.org/W2895823926","https://openalex.org/W2972676112"],"abstract_inverted_index":{"This":[0],"paper":[1],"explores":[2],"how":[3],"blind":[4,78,100],"and":[5,10,15,41,79,118,132],"sighted":[6,80,91],"individuals":[7,81],"perceive":[8],"real":[9],"spoofed":[11],"audio,":[12,97],"highlighting":[13],"differences":[14],"similarities":[16],"between":[17,77],"the":[18,68,90,99],"groups.":[19],"Through":[20],"two":[21],"studies,":[22],"we":[23],"find":[24],"that":[25,49],"both":[26],"groups":[27],"focus":[28],"on":[29],"specific":[30],"human":[31],"traits":[32],"in":[33,63],"audio\u2013such":[34],"as":[35,129],"accents,":[36],"vocal":[37],"inflections,":[38],"breathing":[39],"patterns,":[40],"emotions\u2013to":[42],"assess":[43],"audio":[44,65,120],"authenticity.":[45],"We":[46],"further":[47],"reveal":[48],"humans,":[50],"irrespective":[51],"of":[52,116],"visual":[53],"ability,":[54],"can":[55],"still":[56],"outperform":[57],"current":[58],"state-of-the-art":[59],"machine":[60],"learning":[61],"models":[62],"discerning":[64],"authenticity;":[66],"however,":[67],"task":[69],"proves":[70],"psychologically":[71],"demanding.":[72],"Moreover,":[73],"detection":[74],"accuracy":[75],"scores":[76],"are":[82],"comparable,":[83],"but":[84,121],"each":[85],"group":[86,92,101],"exhibits":[87],"unique":[88],"strengths:":[89],"excels":[93,102],"at":[94,103],"detecting":[95,104],"deepfake-generated":[96],"while":[98],"text-to-speech":[105],"(TTS)":[106],"generated":[107],"audio.":[108],"These":[109],"findings":[110],"not":[111],"only":[112],"deepen":[113],"our":[114],"understanding":[115],"machine-manipulated":[117],"neural-renderer":[119],"also":[122],"have":[123],"implications":[124],"for":[125,136],"developing":[126],"countermeasures,":[127],"such":[128],"perceptible":[130],"watermarks":[131],"human-AI":[133],"collaboration":[134],"strategies":[135],"spoofing":[137],"detection.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
