2016
DOI: 10.1016/j.specom.2016.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Spoofing detection goes noisy: An analysis of synthetic speech detection in the presence of additive noise

Abstract: Automatic speaker verification (ASV) technology is recently finding its way to end-user applications for secure access to personal data, smart services or physical facilities. Similar to other biometric technologies, speaker verification is vulnerable to spoofing attacks where an attacker masquerades as a particular target speaker via impersonation, replay, text-to-speech (TTS) or voice conversion (VC) techniques to gain illegitimate access to the system. We focus on TTS and VC that represent the most flexible… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4
2

Relationship

3
7

Authors

Journals

citations
Cited by 50 publications
(29 citation statements)
references
References 61 publications
0
28
1
Order By: Relevance
“…Physical access scenarios may also be addressed in the future through the re-recording of spoofing attacks with a fixed microphone. e) Additive noise and reverberation: recent studies [100], [82], [83] indicate that some countermeasures offer little resistance to additive noise, with spoofing-detection performance degrading much more rapidly as a function of falling signal-tonoise ratio than is typical for ASV performance. This suggests either an intrinsic difficulty in the problem or what is possibly the result of countermeasures over-trained to the ASVspoof database, which consists of technically high-quality speech.…”
Section: Future Directionsmentioning
confidence: 99%
“…Physical access scenarios may also be addressed in the future through the re-recording of spoofing attacks with a fixed microphone. e) Additive noise and reverberation: recent studies [100], [82], [83] indicate that some countermeasures offer little resistance to additive noise, with spoofing-detection performance degrading much more rapidly as a function of falling signal-tonoise ratio than is typical for ASV performance. This suggests either an intrinsic difficulty in the problem or what is possibly the result of countermeasures over-trained to the ASVspoof database, which consists of technically high-quality speech.…”
Section: Future Directionsmentioning
confidence: 99%
“…Current countermeasures against replay attacks generally operate in one of three ways: (a) identifying exact reproduction of a previous access attempt; (b) exploiting differences in the speech transmission channel [9]; or (c) targeting artefacts in replayed speech such as pop-noise [10], and source features [11]. Commonly used spectral features include sub-band spectral centroid magnitude coefficients (SCMCs) [12], constant-Q cepstral coefficients (CQCCs) [13], single frequency filtering cepstral coefficients (SFF-CCs) [14], inverse Mel frequency cepstral coefficients (IMFCCs) [15], rectangular filter cepstral coefficients (RFCCs) [15], and scattering decomposition based features [16]. In addition, deep neural network (DNN) architectures have also been employed either as discriminative feature extractors [17] or as an end-toend spoofing detectors [18] in a number of ways.…”
Section: Introductionmentioning
confidence: 99%
“…The literature about ASV anti-spoofing in noisy conditions is scarce due to the novelty of this area. One of the first studies was carried out in [11], where the robustness of various frontend features were evaluated under different noisy conditions. In [10], a neural network was trained as an anti-spoofing detection system, and several front-end features were tested under five additive noises and reverberant conditions.…”
Section: Introductionmentioning
confidence: 99%