Spoofing and countermeasures for automatic speaker verification

被引:0
|
作者
Evans, Nicholas [1 ]
Kinnunen, Tomi [2 ]
Yamagishi, Junichi [3 ,4 ]
机构
[1] EURECOM, Sophia Antipolis, France
[2] Univ Eastern Finland, Joensuu, Finland
[3] Univ Edinburgh, Edinburgh, Midlothian, Scotland
[4] Natl Inst Informat, Tokyo, Japan
来源
14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5 | 2013年
基金
芬兰科学院; 英国工程与自然科学研究理事会; 欧盟第七框架计划;
关键词
spoofing; imposture; automatic speaker verification; CHANNEL COMPENSATION; VOICE CONVERSION; VARIABILITY; SECURITY;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work to develop spoofing countermeasures. The paper concludes with a discussion on the need for standard datasets, metrics and formal evaluations which are needed to assess vulnerabilities to spoofing in realistic scenarios without prior knowledge.
引用
收藏
页码:925 / 929
页数:5
相关论文
共 50 条
  • [41] Voice conversion and spoofing attack on speaker verification systems
    Wu, Zhizheng
    Li, Haizhou
    2013 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2013,
  • [42] Preventing converted speech spoofing attacks in speaker verification
    Correia, M. J.
    Abad, A.
    Trancoso, I.
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1320 - 1325
  • [43] Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference
    Luo, Hongwei
    Shen, Yijie
    Lin, Feng
    Xu, Guoai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [44] Deep Learning Serves Voice Cloning: How Vulnerable Are Automatic Speaker Verification Systems to Spoofing Trials?
    Partila, Pavol
    Tovarek, Jaromir
    Ilk, Gokhan Hakki
    Rozhon, Jan
    Voznak, Miroslav
    IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (02) : 100 - 105
  • [45] RAWBOOST: A RAW DATA BOOSTING AND AUGMENTATION METHOD APPLIED TO AUTOMATIC SPEAKER VERIFICATION ANTI-SPOOFING
    Tak, Hemlata
    Kamble, Madhu
    Patino, Jose
    Todisco, Massimiliano
    Evans, Nicholas
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 6382 - 6386
  • [46] Multi-task Learning-Based Spoofing-Robust Automatic Speaker Verification System
    Yuanjun Zhao
    Roberto Togneri
    Victor Sreeram
    Circuits, Systems, and Signal Processing, 2022, 41 : 4068 - 4089
  • [47] Multi-task learning of deep neural networks for joint automatic speaker verification and spoofing detection
    Li, Jiakang
    Sun, Meng
    Zhang, Xiongwei
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1517 - 1522
  • [48] Multi-task Learning-Based Spoofing-Robust Automatic Speaker Verification System
    Zhao, Yuanjun
    Togneri, Roberto
    Sreeram, Victor
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2022, 41 (07) : 4068 - 4089
  • [49] An Application-Oriented Taxonomy on Spoofing, Disguise and Countermeasures in Speaker Recognition
    Li, Lantian
    Cheng, Xingliang
    Zheng, Thomas Fang
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2022, 11 (02)
  • [50] AUTOMATIC SPEAKER VERIFICATION - REVIEW
    ROSENBERG, AE
    PROCEEDINGS OF THE IEEE, 1976, 64 (04) : 475 - 487