2016
DOI: 10.1109/taslp.2016.2526653
|View full text |Cite
|
Sign up to set email alerts
|

Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance

Abstract: In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
45
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 88 publications
(46 citation statements)
references
References 49 publications
0
45
0
1
Order By: Relevance
“…The baseline system is based on the voice conversion toolkit within the open-source Festvox system 2 , as in our previous work [40], we found the toolkit can achieve similar performance to other state-of-the-art voice conversion or speech synthesis adaptation techniques. The toolkit is based on the joint density Gaussian mixture model with maximum likelihood parameter trajectory generation considering global variance as proposed in [27].…”
Section: Baseline Systemmentioning
confidence: 58%
“…The baseline system is based on the voice conversion toolkit within the open-source Festvox system 2 , as in our previous work [40], we found the toolkit can achieve similar performance to other state-of-the-art voice conversion or speech synthesis adaptation techniques. The toolkit is based on the joint density Gaussian mixture model with maximum likelihood parameter trajectory generation considering global variance as proposed in [27].…”
Section: Baseline Systemmentioning
confidence: 58%
“…software available to the public, including fraudsters. More details including protocols used to generate spoofed speech can be found in [6], [7]. Figure 2 provides an intuitive visualisation of the acoustic similarities between each spoofing-attack algorithm and genuine speech.…”
Section: S10mentioning
confidence: 99%
“…The S1 and S2 spoofing-attack algorithms are two of the most easily implemented voiceconversion algorithms. The S3, S4, and S5 spoofing-attack algorithms were all implemented using either the HTS 6 or Festvox 7 , both of which are publicly available and open source. The remaining unknown attacks (S6-S10) are generally more sophisticated.…”
Section: Protocolsmentioning
confidence: 99%
See 2 more Smart Citations