Spoofing and countermeasures for automatic speaker verification

被引:0
|
作者
Evans, Nicholas [1 ]
Kinnunen, Tomi [2 ]
Yamagishi, Junichi [3 ,4 ]
机构
[1] EURECOM, Sophia Antipolis, France
[2] Univ Eastern Finland, Joensuu, Finland
[3] Univ Edinburgh, Edinburgh, Midlothian, Scotland
[4] Natl Inst Informat, Tokyo, Japan
基金
英国工程与自然科学研究理事会; 欧盟第七框架计划; 芬兰科学院;
关键词
spoofing; imposture; automatic speaker verification; CHANNEL COMPENSATION; VOICE CONVERSION; VARIABILITY; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work to develop spoofing countermeasures. The paper concludes with a discussion on the need for standard datasets, metrics and formal evaluations which are needed to assess vulnerabilities to spoofing in realistic scenarios without prior knowledge.
引用
收藏
页码:925 / 929
页数:5
相关论文
共 50 条
  • [31] Re-assessing the threat of replay spoofing attacks against automatic speaker verification
    Alegre, Federico
    Janicki, Artur
    Evans, Nicholas
    2014 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG), 2014,
  • [32] Towards Generating Adversarial Examples on Combined Systems of Automatic Speaker Verification and Spoofing Countermeasure
    Zhang, Xingyu
    Zhang, Xiongwei
    Zou, Xia
    Liu, Haibo
    Sun, Meng
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [33] On the Vulnerability of Speaker Verification to Realistic Voice Spoofing
    Ergunay, Serife Kucur
    Khoury, Elie
    Lazaridis, Alexandros
    Marcel, Sebastien
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [34] Backend Ensemble for Speaker Verification and Spoofing Countermeasure
    Zhang, Li
    Li, Yue
    Zhao, Huan
    Wang, Qing
    Xie, Lei
    INTERSPEECH 2022, 2022, : 4381 - 4385
  • [35] A Subnetwork Approach for Spoofing Aware Speaker Verification
    Alenin, Alexander
    Torgashov, Nikita
    Okhotnikov, Anton
    Makarov, Rostislav
    Yakovlev, Ivan
    INTERSPEECH 2022, 2022, : 2888 - 2892
  • [36] A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns
    Alegre, Federico
    Amehraye, Asmaa
    Evans, Nicholas
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2013,
  • [37] Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance
    Wu, Zhizheng
    De Leon, Phillip L.
    Demiroglu, Cenk
    Khodabakhsh, Ali
    King, Simon
    Ling, Zhen-Hua
    Saito, Daisuke
    Stewart, Bryan
    Toda, Tomoki
    Wester, Mirjam
    Yamagishi, Junichi
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2016, 24 (04) : 768 - 783
  • [38] Data selection for i-vector based automatic speaker verification anti-spoofing
    Hanilci, Cemal
    DIGITAL SIGNAL PROCESSING, 2018, 72 : 171 - 180
  • [39] Spoofing Detection in Automatic Speaker Verification Systems Using DNN Classifiers and Dynamic Acoustic Features
    Yu, Hong
    Tan, Zheng-Hua
    Ma, Zhanyu
    Martin, Rainer
    Guo, Jun
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018, 29 (10) : 4633 - 4644
  • [40] DETECTION AND EVALUATION OF HUMAN AND MACHINE GENERATED SPEECH IN SPOOFING ATTACKS ON AUTOMATIC SPEAKER VERIFICATION SYSTEMS
    Gao, Yang
    Lian, Jiachen
    Raj, Bhiksha
    Singh, Rita
    2021 IEEE SPOKEN LANGUAGE TECHNOLOGY WORKSHOP (SLT), 2021, : 544 - 551