Integrated Replay Spoofing-Aware Text-Independent Speaker Verification

被引:7
作者
Shim, Hye-jin [1 ]
Jung, Jee-weon [1 ]
Kim, Ju-ho [1 ]
Yu, Ha-jin [1 ]
机构
[1] Univ Seoul, Sch Comp Sci, Seoul 02504, South Korea
来源
APPLIED SCIENCES-BASEL | 2020年 / 10卷 / 18期
关键词
speaker verification; presentation attack detection; deep neural networks;
D O I
10.3390/app10186292
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A number of studies have successfully developed speaker verification or presentation attack detection systems. However, studies integrating the two tasks remain in the preliminary stages. In this paper, we propose two approaches for building an integrated system of speaker verification and presentation attack detection: an end-to-end monolithic approach and a back-end modular approach. The first approach simultaneously trains speaker identification, presentation attack detection, and the integrated system using multi-task learning using a common feature. However, through experiments, we hypothesize that the information required for performing speaker verification and presentation attack detection might differ because speaker verification systems try to remove device-specific information from speaker embeddings, while presentation attack detection systems exploit such information. Therefore, we propose a back-end modular approach using a separate deep neural network (DNN) for speaker verification and presentation attack detection. This approach has thee input components: two speaker embeddings (for enrollment and test each) and prediction of presentation attacks. Experiments are conducted using the ASVspoof 2017-v2 dataset, which includes official trials on the integration of speaker verification and presentation attack detection. The proposed back-end approach demonstrates a relative improvement of 21.77% in terms of the equal error rate for integrated trials compared to a conventional speaker verification system.
引用
收藏
页数:9
相关论文
共 26 条
[1]  
[Anonymous], 2019, ARXIV190405576
[2]  
[Anonymous], 2019, INTERSPEECH 2019 20
[3]  
[Anonymous], 2019, P INTERSPEECH 2019
[4]   Deep Speaker Recognition: Modular or Monolithic? [J].
Bhattacharya, Gautam ;
Alam, Jahangir ;
Kenny, Patrick .
INTERSPEECH 2019, 2019, :1143-1147
[5]  
Caruana R.A., 1998, MULTITASK LEARNING K
[6]  
Dhanush BK, 2017, INT CONF ACOUST SPEE, P5385, DOI 10.1109/ICASSP.2017.7953185
[7]   Incorporating Computational Thinking in the Classrooms of Puerto Rico: How a MOOC Served as an Outreach and Recruitment Tool for Computer Science Education [J].
Franco, Patricia Ordonez ;
Carroll-Miranda, Joseph ;
Delgado, Maria Lopez ;
Lopez, Eliud Gerena ;
Gomez, Grace Rodriguez .
SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, :296-301
[8]   Far-field speaker recognition [J].
Jin, Qin ;
Schultz, Tanja ;
Waibel, Alex .
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2007, 15 (07) :2023-2032
[9]   RawNet: Advanced end-to-end deep neural network using raw waveforms for text-independent speaker verification [J].
Jung, Jee-weon ;
Heo, Hee-Soo ;
Kim, Ju-ho ;
Shim, Hye-jin ;
Yu, Ha-Jin .
INTERSPEECH 2019, 2019, :1268-1272
[10]   Replay attack detection with complementary high-resolution information using end-to-end DNN for the ASVspoof 2019 Challenge [J].
Jung, Jee-weon ;
Shim, Hye-jin ;
Heo, Hee-Soo ;
Yu, Ha-Jin .
INTERSPEECH 2019, 2019, :1083-1087