2016 International Conference of the Biometrics Special Interest Group (BIOSIG) 2016
DOI: 10.1109/biosig.2016.7736933
|View full text |Cite
|
Sign up to set email alerts
|

Presentation Attack Detection Using Long-Term Spectral Statistics for Trustworthy Speaker Verification

Abstract: Abstract-In recent years, there has been a growing interest in developing countermeasures against non zero-effort attacks for speaker verification systems. Until now, the focus has been on logical access attacks, where the spoofed samples are injected into the system through a software-based process. This paper investigates a more realistic type of attack, referred to as physical access or presentation attacks, where the spoofed samples are presented as input to the microphone. To detect such attacks, we propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 34 publications
(27 reference statements)
0
14
0
Order By: Relevance
“…However, the ASVspoof database gave special attention to LA attacks. For such attacks, it is assumed that the spoofed samples are directly injected into the system through a software-based process [21]. Hence, PA attacks are more realistic than the logical access attacks, where the attacker plays back a recorded utterance to the system.…”
Section: I L I M I T a T I O N S A N D T E C H N O L O G I C A L mentioning
confidence: 99%
“…However, the ASVspoof database gave special attention to LA attacks. For such attacks, it is assumed that the spoofed samples are directly injected into the system through a software-based process [21]. Hence, PA attacks are more realistic than the logical access attacks, where the attacker plays back a recorded utterance to the system.…”
Section: I L I M I T a T I O N S A N D T E C H N O L O G I C A L mentioning
confidence: 99%
“…The use of various cepstral-based features using AVspoof 2015 database has been carried out in [24,25]. Likewise in [26], the use of long-term spectral statistics is done for spoof detection. In this work, we propose a replay detector based on Variable length Teager Energy Operator-Energy Separation Algorithm-Instantaneous Frequency Cosine Coefficients (VESA-IFCC).…”
Section: Introductionmentioning
confidence: 99%
“…Several audio descriptors originally proposed for speaker verification and speech recognition have also been studied in the context of PAD systems [SKH15] (and references there in). Features specifically designed for anti-spoofing systems were the focus of recent research [CRS07,TDE16,MMDM16].…”
Section: Introductionmentioning
confidence: 99%