2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2018
DOI: 10.1109/icassp.2018.8462644
|View full text |Cite
|
Sign up to set email alerts
|

Recurrent Neural Networks for Automatic Replay Spoofing Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…Nonetheless, using the speech frame selection approach [58], the performance of the CQCC-GMM countermeasure improved to 21.60% EER. Replay attack detectors proposed by researchers using Recurrent Neural Networks (RNN) with Filter Bank (Fbank) features have achieved 9.81% EER [16], whereas the one using Deep Neural Networks (DNN) and Support Vector Machine (SVM) classifiers with CQCC and High-Frequency Cepstral Coefficients (HFCC) features have achieved 11.5% EER [82]. The best replay attack detector system in ASVspoof 2017 Challenge hit an EER of 6.73% on the evaluation dataset was a fusion system that adopted several classifiers and features [60].…”
Section: Voice Presentation Attack Detection (Pad)mentioning
confidence: 99%
See 1 more Smart Citation
“…Nonetheless, using the speech frame selection approach [58], the performance of the CQCC-GMM countermeasure improved to 21.60% EER. Replay attack detectors proposed by researchers using Recurrent Neural Networks (RNN) with Filter Bank (Fbank) features have achieved 9.81% EER [16], whereas the one using Deep Neural Networks (DNN) and Support Vector Machine (SVM) classifiers with CQCC and High-Frequency Cepstral Coefficients (HFCC) features have achieved 11.5% EER [82]. The best replay attack detector system in ASVspoof 2017 Challenge hit an EER of 6.73% on the evaluation dataset was a fusion system that adopted several classifiers and features [60].…”
Section: Voice Presentation Attack Detection (Pad)mentioning
confidence: 99%
“…Nonetheless, the end-to-end learning approach still contributed more than 15% in overall recent Fig. 16 The proportion of methodology used in voice PAD in recent years Fig. 17 The trend of datasets used in voice PAD in recent years works considered.…”
Section: An Analysis To the Trend Of Voice Pad In Recent Yearsmentioning
confidence: 99%
“…While related studies either proposed individual models for each spoofing method (i.e., PA or LA) [11,12,13], are limited to a specific language (e.g., English), require additional hardware components due to the model's size [14], or are limited to specific applications (impersonation [15,16], replay [17,18,19], speech synthesis [20], or voice conversion [21]), further research is required to advance the accuracy, and universal practicability of such fake voice detection approaches.…”
Section: Introductionmentioning
confidence: 99%
“…In Qian, Chen, Dinkel, and Wu (2017), authors used traditional deep neural networks, convolutional neural networks, and long short‐term memory (LSTM) as deep feature extractors, and LDA as the back‐end classifier. Recurrent neural networks have been used as back‐end classifiers in Chen, Zhang, Xie, Xu, and Chen (2018) and Cai, Cai, Liu, Li, and Li (2017).…”
Section: Introductionmentioning
confidence: 99%