Integrated Spoofing Countermeasures and Automatic Speaker Verification: an Evaluation on ASVspoof 2015

被引:30
作者
Sahidullah, Md [1 ]
Delgado, Hector [2 ]
Todisco, Massimiliano [2 ]
Yu, Hong [3 ]
Kinnunen, Tomi [1 ]
Evans, Nicholas [2 ]
Tana, Zheng-Hua [3 ]
机构
[1] Univ Eastern Finland, Sch Comp, Speech & Image Proc Unit, Kuopio, Finland
[2] EURECOM, Dept Digital Secur, Biot, France
[3] Aalborg Univ, Dept Elect Syst, Signal & Informat Proc, Aalborg, Denmark
来源
17TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2016), VOLS 1-5: UNDERSTANDING SPEECH PROCESSING IN HUMANS AND MACHINES | 2016年
关键词
Automatic speaker recognition; spoofing; countermeasures; presentation attack detection; SYSTEMS; SECURITY;
D O I
10.21437/Interspeech.2016-1280
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
It is well known that automatic speaker verification (ASV) systems can be vulnerable to spoofing. The community has responded to the threat by developing dedicated countermeasures aimed at detecting spoofing attacks. Progress in this area has accelerated over recent years, partly as a result of the first standard evaluation, ASVspoof 2015, which focused on spoofing detection in isolation from ASV. This paper investigates the integration of state-of-the-art spoofing countermeasures in combination with ASV. Two general strategies to countermeasure integration are reported: cascaded and parallel. The paper reports the first comparative evaluation of each approach performed with the ASVspoof 2015 corpus. Results indicate that, even in the case of varying spoofing attack algorithms, ASV performance remains robust when protected with a diverse set of integrated countermeasures.
引用
收藏
页码:1700 / 1704
页数:5
相关论文
共 28 条
[1]  
Adiga A, 2013, TENCON IEEE REGION
[2]  
Alegre F., 2013, BIOMETRICS THEORY AP, P1
[3]  
Alegre F, 2013, INT CONF ACOUST SPEE, P3068, DOI 10.1109/ICASSP.2013.6638222
[4]  
[Anonymous], P INT
[5]  
[Anonymous], 2016, ISO/IEC 30107-1
[6]  
[Anonymous], 2015, P INT
[7]  
[Anonymous], 2007, INT J SIGNAL PROCESS
[8]  
[Anonymous], P INTERSPEECH
[9]  
[Anonymous], 2016, NEW FEATURE AUTOMATI
[10]   Security evaluation of biometric authentication systems under real spoofing attacks [J].
Biggio, B. ;
Akhtar, Z. ;
Fumera, G. ;
Marcialis, G. L. ;
Roli, F. .
IET BIOMETRICS, 2012, 1 (01) :11-24