2022
DOI: 10.48550/arxiv.2201.03321
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Practical Guide to Logical Access Voice Presentation Attack Detection

Abstract: Voice-based human-machine interfaces with an automatic speaker verification (ASV) component are commonly used in the market. However, the threat from presentation attacks is also growing since attackers can use recent speech synthesis technology to produce a naturalsounding voice of a victim. Presentation attack detection (PAD) for ASV, or speech anti-spoofing, is therefore indispensable. Research on voice PAD has seen significant progress since the early 2010s, including the advancement in PAD models, benchma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 93 publications
(169 reference statements)
0
1
0
Order By: Relevance
“…Led by the ASVspoof initiative and corresponding challenge series, countermeasure (CM) systems have hence been developed in order to help detect and deflect spoofing attacks [8][9][10]. In the case of a logical access, telephony scenario involving only TTS and VC attacks, the best performing spoofing CM systems can deliver EERs of less than 2% [11][12][13][14][15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…Led by the ASVspoof initiative and corresponding challenge series, countermeasure (CM) systems have hence been developed in order to help detect and deflect spoofing attacks [8][9][10]. In the case of a logical access, telephony scenario involving only TTS and VC attacks, the best performing spoofing CM systems can deliver EERs of less than 2% [11][12][13][14][15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%