The Speaker and Language Recognition Workshop (Odyssey 2018) 2018
DOI: 10.21437/odyssey.2018-43
|View full text |Cite
|
Sign up to set email alerts
|

An Audio Fingerprinting Approach to Replay Attack Detection on ASVSPOOF 2017 Challenge Data

Abstract: Replay attacks, where an impostor replays a genuine user utterance, are a major vulnerability of speaker verification systems. Two highly likely scenarios for replay attacks are either hidden recording of actual spoken access trials, or reusing previous genuine recordings in case of fraudulent access to transmission channels or storage devices. In both scenarios, an audio fingerprint-based approach comparing any access trial with all previous recordings from the claimed speaker perfectly fits the task of repla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Some of the replay attack detection systems have been proposed by working on the features which are fed into the network (Witkowski et al, 2017 ). Others have improved the networks used or have worked on both of the networks and features (Lavrentyeva et al, 2017 ; Nagarsheth et al, 2017 ; Gonzalez-Rodriguez et al, 2018 ; Huang and Pun, 2019 , 2020 ; Lai et al, 2019 ; Li et al, 2019 ). Additionally, before the ASVspoof Challenge 2017 (Kinnunen et al, 2017 ; Lavrentyeva et al, 2017 ), there were only a couple of research papers done on replay attack, and after this challenge, more approaches for this attack were researched (Tom et al, 2018 ; Pradhan et al, 2019 ).…”
Section: Deepfake Categoriesmentioning
confidence: 99%
“…Some of the replay attack detection systems have been proposed by working on the features which are fed into the network (Witkowski et al, 2017 ). Others have improved the networks used or have worked on both of the networks and features (Lavrentyeva et al, 2017 ; Nagarsheth et al, 2017 ; Gonzalez-Rodriguez et al, 2018 ; Huang and Pun, 2019 , 2020 ; Lai et al, 2019 ; Li et al, 2019 ). Additionally, before the ASVspoof Challenge 2017 (Kinnunen et al, 2017 ; Lavrentyeva et al, 2017 ), there were only a couple of research papers done on replay attack, and after this challenge, more approaches for this attack were researched (Tom et al, 2018 ; Pradhan et al, 2019 ).…”
Section: Deepfake Categoriesmentioning
confidence: 99%
“…The last type of attacks is replay attack with pre-recorded audio and it is considered to be the most difficult attack to detect [1]. Possible ways to tackle this problem are (a) anti-spoofing techniques based on detecting typical distortions in recorded and replayed audio [3,9], (b) using audio fingerprinting [10] to detect a replay of an enrollment utterance, and (c) using liveness detection and phrase verification [11] in text-dependent speaker verification. This paper presents the collaborative efforts of BUT and Omilia to introduce novel countermeasures for the last three attack types, as part of the 2019 automatic speaker verification (ASV) anti-spoofing challenge.…”
Section: Introductionmentioning
confidence: 99%
“…The third type utilizes audio fingerprinting to check whether an incoming recording is similar to previously authenticated utterances that were automatically saved in the ASV system. Rodriguez et al [13] developed such a system: if the similarity score was higher than a threshold, the recording was treated as a playback attack. A disadvantage of this type of CM is that it is sensitive to noise.…”
Section: Introductionmentioning
confidence: 99%