Device Features Based on Linear Transformation With Parallel Training Data for Replay Speech Detection

被引:3
|
作者
Xu, Longting [1 ]
Yang, Jichen [2 ,3 ]
You, Chang Huai [4 ]
Qian, Xinyuan [5 ]
Huang, Daiyu [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 200051, Peoples R China
[2] Guangdong Polytech Normal Univ, Sch Cyber Secur, Guangzhou 510665, Peoples R China
[3] South China Normal Univ, Sch Elect & Informat Engn, Foshan 510631, Peoples R China
[4] ASTAR, Inst Infocomm Res, Singapore 138632, Singapore
[5] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
基金
中国国家自然科学基金;
关键词
Feature extraction; Data mining; Mel frequency cepstral coefficient; Recording; Voice activity detection; Transforms; Cepstral analysis; Device feature; linear transformation; replay speech detection; SPEAKER VERIFICATION; INSTANTANEOUS FREQUENCY; EXTRACTION; SYSTEM;
D O I
10.1109/TASLP.2023.3267610
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Replay speech poses a growing threat to speaker verification systems, thus the detection of replay speech becomes increasingly important. A critical factor differentiating replay speech and genuine speech is the representation of device information. Replay speech carries physical device information that originates from recording device, playback device, and environmental noise. In this work, a device-related linear transformation strategy is proposed to disentangle non-device information from replay speech. First, we conduct factor analysis by introducing a common vector for both replay utterance and the corresponding genuine speech utterance on parallel training data; then, we derive an expectation maximization formula to obtain the parameters of the device-related linear transformation; subsequently, three device feature extraction methods are developed based on the device-related linear transformation. The developed device features are evaluated on ASVspoof 2017 version 2.0 and ASVspoof 2021 physical access corpora. The experimental results demonstrate that our proposed linear transformation strategy is effective for replay spoofing detection, and the resultant device features outperform many typical features. Moreover, our spoofing detection systems display superior performance over several competitive state-of-the-art systems.
引用
收藏
页码:1574 / 1586
页数:13
相关论文
共 50 条
  • [41] SVM-based speech endpoint detection using contextual speech features
    Ramirez, J.
    Yelamos, R.
    Gorriz, J. M.
    Segura, J. C.
    ELECTRONICS LETTERS, 2006, 42 (07) : 426 - 428
  • [42] Speech Based Features Applied to the Detection of Non-speech Audio Events
    Vozarikova, Eva
    Cizmar, Anton
    12TH INTERNATIONAL CONFERENCE ON RESEARCH IN TELECOMMUNICATION TECHNOLOGIES (RTT 2010), 2010, : 125 - 128
  • [43] Speech/Non-Speech Segments Detection Based On Chaotic and Prosodic Features
    Shafiee, Soheil
    Almasganj, Farshad
    Jafari, Ayyoob
    INTERSPEECH 2008: 9TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION 2008, VOLS 1-5, 2008, : 111 - 114
  • [44] Detection of replay attacks to GNSS based on partial correlations and authentication data unpredictability
    Gonzalo Seco-Granados
    David Gómez-Casco
    José A. López-Salcedo
    Ignacio Fernández-Hernández
    GPS Solutions, 2021, 25
  • [45] Topological Data Analysis-Based Replay Attack Detection for Water Networks
    Kuskonmaz, Bulut
    Wisniewski, Rafal
    Kallesoe, Carsten
    IFAC PAPERSONLINE, 2024, 58 (04): : 91 - 96
  • [46] Discriminative transformation for speech features based on genetic algorithm and HMM likelihoods
    Zamani, Behzad
    Akbari, Ahmad
    Nasersharif, Babak
    Mohammadi, Mehdi
    Jalalvand, Azarakhsh
    IEICE ELECTRONICS EXPRESS, 2010, 7 (04): : 247 - 253
  • [47] Transformation of Emotion based on Acoustic Features of Intonation Patterns for Hindi Speech
    Agrawal, S. S.
    Prakash, Nupur
    Jain, Manurag
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (09): : 198 - 205
  • [48] Detection of replay attacks to GNSS based on partial correlations and authentication data unpredictability
    Seco-Granados, Gonzalo
    Gomez-Casco, David
    Lopez-Salcedo, Jose A.
    Fernandez-Hernandez, Ignacio
    GPS SOLUTIONS, 2021, 25 (02)
  • [49] Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
    Firdaus, Ahmad
    Anuar, Nor Badrul
    Ab Razak, Mohd Faizal
    Hashem, Ibrahim Abaker Targio
    Bachok, Syafiq
    Sangaiah, Arun Kumar
    JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (06)
  • [50] Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
    Ahmad Firdaus
    Nor Badrul Anuar
    Mohd Faizal Ab Razak
    Ibrahim Abaker Targio Hashem
    Syafiq Bachok
    Arun Kumar Sangaiah
    Journal of Medical Systems, 2018, 42