ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection

被引:295
作者
Todisco, Massimiliano [1 ]
Wang, Xin [2 ]
Vestman, Ville [3 ,6 ]
Sahidullah, Md [4 ]
Delgado, Hector [1 ]
Nautsch, Andreas [1 ]
Yamagishi, Junichi [2 ,5 ]
Evans, Nicholas [1 ]
Kinnunen, Tomi H. [3 ]
Lee, Kong Aik [6 ]
机构
[1] EURECOM, Biot, France
[2] Natl Inst Informat, Tokyo, Japan
[3] Univ Eastern Finland, Kuopio, Finland
[4] INRIA, Paris, France
[5] Univ Edinburgh, Edinburgh, Midlothian, Scotland
[6] NEC Corp Ltd, Tokyo, Japan
来源
INTERSPEECH 2019 | 2019年
基金
芬兰科学院;
关键词
spoofing; automatic speaker verification; ASVspoof; presentation attack detection; fake audio;
D O I
10.21437/Interspeech.2019-2249
中图分类号
R36 [病理学]; R76 [耳鼻咽喉科学];
学科分类号
100104 ; 100213 ;
摘要
ASVspoof, now in its third edition, is a series of community-led challenges which promote the development of countermeasures to protect automatic speaker verification (ASV) from the threat of spoofing. Advances in the 2019 edition include: (i) a consideration of both logical access (LA) and physical access (PA) scenarios and the three major forms of spoofing attack, namely synthetic, converted and replayed speech; (ii) spoofing attacks generated with state-of-the-art neural acoustic and waveform models; (iii) an improved, controlled simulation of replay attacks; (iv) use of the tandem detection cost function (t-DCF) that reflects the impact of both spoofing and countermeasures upon ASV reliability. Even if ASV remains the core focus, in retaining the equal error rate (EER) as a secondary metric, ASVspoof also embraces the growing importance of fake audio detection. ASVspoof 2019 attracted the participation of 63 research teams, with more than half of these reporting systems that improve upon the performance of two baseline spoofing countermeasures. This paper describes the 2019 database, protocols and challenge results. It also outlines major findings which demonstrate the real progress made in protecting against the threat of spoofing and fake audio.
引用
收藏
页码:1008 / 1012
页数:5
相关论文
共 29 条
[1]  
[Anonymous], 2014, INT SPEECH COMMUNICA
[2]  
[Anonymous], 2019, AUT SPEAK VER SPOOF
[3]  
CAMPBELL D, 2005, COMPUT INF SYST J IS, V9, P1352
[4]  
Evans N, 2013, INTERSPEECH, P925
[5]   SIGNAL ESTIMATION FROM MODIFIED SHORT-TIME FOURIER-TRANSFORM [J].
GRIFFIN, DW ;
LIM, JS .
IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1984, 32 (02) :236-243
[6]   Voice Conversion from Unaligned Corpora using Variational Autoencoding Wasserstein Generative Adversarial Networks [J].
Hsu, Chin-Cheng ;
Hwang, Hsin-Te ;
Wu, Yi-Chiao ;
Tsao, Yu ;
Wang, Hsin-Min .
18TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2017), VOLS 1-6: SITUATED INTERACTION, 2017, :3364-3368
[7]   An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks [J].
Janicki, Artur ;
Alegre, Federico ;
Evans, Nicholas .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) :3030-3044
[8]  
Jia Y., 2018, ABS180604558 CORR
[9]  
Juvela L, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P5679, DOI 10.1109/ICASSP.2018.8461852
[10]  
Kinnunen T., 2018, P OD SABL DOL FRANC