The Speaker and Language Recognition Workshop (Odyssey 2018) 2018
DOI: 10.21437/odyssey.2018-42
|View full text |Cite
|
Sign up to set email alerts
|

ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements

Abstract: The now-acknowledged vulnerabilities of automatic speaker verification (ASV) technology to spoofing attacks have spawned interests to develop so-called spoofing countermeasures. By providing common databases, protocols and metrics for their assessment, the ASVspoof initiative was born to spearhead research in this area. The first competitive ASVspoof challenge held in 2015 focused on the assessment of countermeasures to protect ASV technology from voice conversion and speech synthesis spoofing attacks. The sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
110
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 123 publications
(113 citation statements)
references
References 19 publications
2
110
1
Order By: Relevance
“…On the ASVspoof 2017 dataset, the GMM displays EERs of 19.07% and 22.6% on the development and evaluation sets, respectively. Note that our baseline is completely different from the CQCC-GMM results of [84] for two reasons. First, we use a unified time representation of the first 100 frames obtained either by truncating or copying time frames, for reasons explained earlier.…”
Section: Impact Of Latent Space Dimensionalitymentioning
confidence: 95%
See 1 more Smart Citation
“…On the ASVspoof 2017 dataset, the GMM displays EERs of 19.07% and 22.6% on the development and evaluation sets, respectively. Note that our baseline is completely different from the CQCC-GMM results of [84] for two reasons. First, we use a unified time representation of the first 100 frames obtained either by truncating or copying time frames, for reasons explained earlier.…”
Section: Impact Of Latent Space Dimensionalitymentioning
confidence: 95%
“…We apply a pre-processing step on the raw-audio waveforms to trim silence/noise before and after the utterance in the training, development and test sets, following recommendations in [45] and [76]. Following [84], we extract log energy plus 19dimensional static coefficients augmented with deltas and double-deltas, yielding 60-dimensional feature vectors. This is followed by cepstral mean and variance normalisation.…”
Section: Features and Input Representationmentioning
confidence: 99%
“…We use two publicly available spoofing datasets, ASVspoof 2017 v2.0 [28] and ASVspoof 2019 physical access (PA), [7] for model training and testing. In addition, we also include results on the recently released ASVspoof2019 real PA dataset 1 for the challenging case of cross-database performance evaluation.…”
Section: Datasetmentioning
confidence: 99%
“…The evaluation subset contains data collected from 161 replay sessions in 62 unique replay configurations 7 . More details regarding replay configurations can be found in [126,135].…”
Section: Asvspoof 2017mentioning
confidence: 99%