2020
DOI: 10.3390/app10186292
|View full text |Cite
|
Sign up to set email alerts
|

Integrated Replay Spoofing-Aware Text-Independent Speaker Verification

Abstract: A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages. In this paper, we propose two approaches for building an integrated system of speaker verification and presentation attack detection: an end-to-end monolithic approach and a back-end modular approach. The first approach simultaneously trains speaker identification, presentation attack detection, and the integrated system usin… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 28 publications
(46 reference statements)
0
14
0
Order By: Relevance
“…Third, we present a new readout scheme that utilizes the stack node. Finally, given the application of anti-spoofing solutions in aasisting speaker verification systems [18,19] and given the associated requirement for practical, lightweight models, we further propose a lightweight variant of AA-SIST which comprises only 85K parameters.…”
Section: Introductionmentioning
confidence: 99%
“…Third, we present a new readout scheme that utilizes the stack node. Finally, given the application of anti-spoofing solutions in aasisting speaker verification systems [18,19] and given the associated requirement for practical, lightweight models, we further propose a lightweight variant of AA-SIST which comprises only 85K parameters.…”
Section: Introductionmentioning
confidence: 99%
“…Kanervisto et al [22] proposed a reinforcement learning paradigm to optimize tandem detection cost function (t-DCF) by jointly training a tandem ASV and CM system. Shim et al [23] proposed a fusion-based approach that takes the speaker embedding and CM prediction as input and weighs the ASV score, CM score, and their multiplication to make the final decision.…”
Section: Fusion-based Methodsmentioning
confidence: 99%
“…The goal of the new SASV challenge is hence to further improve robustness to both zero-effort impostor access attempts and spoofing attacks by providing a framework to support the optimisation of CM and ASV systems operating in tandem and, ultimately, facilitate the development of single integrated systems. With only relatively little previous work in this direction [24][25][26][27][28], the objectives of the first challenge are to:…”
Section: Challenge Objectivesmentioning
confidence: 99%