2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS) 2015
DOI: 10.1109/btas.2015.7358783
|View full text |Cite
|
Sign up to set email alerts
|

On the vulnerability of speaker verification to realistic voice spoofing

Abstract: Automatic speaker verification (ASV) systems are subject to various kinds of malicious attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the performance of a standard ASV system by increasing its false acceptance rates. This issue raised a high level of interest in the speech research community where the possible voice spoofing attacks and their related countermeasures have been investigated. However, much less effort has been devoted in creating realistic and diverse spoofing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 94 publications
(72 citation statements)
references
References 27 publications
(28 reference statements)
0
72
0
Order By: Relevance
“…APCER with BPCER are computed for Eval set of a given dataset using the EER threshold obtained from the Dev set from another dataset (see Table 1.4). Table 1.4: Performance of PAD systems in terms of average APCER (%), BPCER (%), and C llr of calibrated scores in cross-database testing on ASVspoof [4] and AVspoof [6] To avoid prior to the evaluations, the raw scores from each individual PAD system are pre-calibrated with logistic regression based on Platts sigmoid method [36] by modeling scores of the training set and applying the model on the scores from development and evaluation sets. The calibration cost C llr and the discrimination loss C min llr of the resulted calibrated scores are provided.…”
Section: Pads Failing To Generalizementioning
confidence: 99%
See 2 more Smart Citations
“…APCER with BPCER are computed for Eval set of a given dataset using the EER threshold obtained from the Dev set from another dataset (see Table 1.4). Table 1.4: Performance of PAD systems in terms of average APCER (%), BPCER (%), and C llr of calibrated scores in cross-database testing on ASVspoof [4] and AVspoof [6] To avoid prior to the evaluations, the raw scores from each individual PAD system are pre-calibrated with logistic regression based on Platts sigmoid method [36] by modeling scores of the training set and applying the model on the scores from development and evaluation sets. The calibration cost C llr and the discrimination loss C min llr of the resulted calibrated scores are provided.…”
Section: Pads Failing To Generalizementioning
confidence: 99%
“…To our knowledge, the largest publicly available database containing speech presentation attacks is AVspoof [6] 2 . AVspoof database contains real (genuine) speech samples from 44 participants (31 males and 13 females) recorded over the period of two months in four sessions, each scheduled several days apart in different setups and environmental conditions such as background noises.…”
Section: Avspoof Databasementioning
confidence: 99%
See 1 more Smart Citation
“…Recently, a database, called AVspoof 2 [5], with several replay-based attacks (logical access attacks are also provided) became publicly available. It contains a comprehensive set of presentation attacks, including, (i) the direct replay attacks when a genuine data is played back using a laptop and two phones (Samsung Galaxy S4 and iPhone 3G), (ii) synthesized speech replayed with a laptop, and (iii) an attack data, generated using a voice conversion algorithm, replayed with a laptop.…”
Section: Introductionmentioning
confidence: 99%
“…These spoofing attacks were generated using different voice conversion and speech synthesis techniques. During and after the ASVspoof2015 challenge, many countermeasures based on spectral amplitude, phase [5][6][7][10][11][12][13][14][15][16][17][18][19], and combined amplitude-phase [8][9], have been used for spoofing detection. Some recent studies using the ASVspoof2015 corpus include constant Q cepstral coefficients [7], pitch contour and strength of excitation [19] for spoofing detection, and analyses of robustness of spoofing detection systems in the presence of additive and convolutive noise [15,16].…”
Section: Introductionmentioning
confidence: 99%