Interspeech 2014 2014
DOI: 10.21437/interspeech.2014-13
|View full text |Cite
|
Sign up to set email alerts
|

Introducing i-vectors for joint anti-spoofing and speaker verification

Abstract: Any biometric recognizer is vulnerable to direct spoofing attacks and automatic speaker verification (ASV) is no exception; replay, synthesis and conversion attacks all provoke false acceptances unless countermeasures are used. We focus on voice conversion (VC) attacks. Most existing countermeasures use full knowledge of a particular VC system to detect spoofing. We study a potentially more universal approach involving generative modeling perspective. Specifically, we adopt standard ivector representation and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 30 publications
(32 reference statements)
0
10
0
Order By: Relevance
“…In our experiments, the simplest ideas tended to outperform more elaborate ones. For instance, raw power spectrum features and maximum likelihood (ML) trained Gaussian mixture models (GMMs) did a decent job both in detecting both unknown and known attacks, while i-vector [43] based spoofing detection [24,44] yielded much higher error rates.…”
Section: Contribution Of the Present Study: Joint Effect Of Varied At...mentioning
confidence: 99%
“…In our experiments, the simplest ideas tended to outperform more elaborate ones. For instance, raw power spectrum features and maximum likelihood (ML) trained Gaussian mixture models (GMMs) did a decent job both in detecting both unknown and known attacks, while i-vector [43] based spoofing detection [24,44] yielded much higher error rates.…”
Section: Contribution Of the Present Study: Joint Effect Of Varied At...mentioning
confidence: 99%
“…Previous models include the ever so popular i-vector [3,4,5], which when used as a standalone model does not perform arXiv:2007.13060v1 [eess.AS] 26 Jul 2020 well. Another popular approach is to use the traditional GMM model.…”
Section: Modelmentioning
confidence: 99%
“…Research work on anti-spoofing can be divided into one of the three categories: Feature Learning [5,6,7,8,9,10,11,12,13,14], Statistical Modeling [4,15,16,17], and Deep Neural Network (DNN) [18,19,20,21,22,23,24,25]. Having witnessed the successes of DNNs in ASVspoof 2017, we decided to explore and extend several DNN-based systems for the ASVspoof 2019 Challenge.…”
Section: Introductionmentioning
confidence: 99%