Publication | Open Access
Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance
100
Citations
71
References
2016
Year
EngineeringInformation SecurityBiometricsVerificationCommunicationAutomatic Speaker VerificationSpeech RecognitionHardware SecuritySpeaker DiarizationRobust Speech RecognitionInitial DatabaseText-independent Speaker VerificationVoice RecognitionHealth SciencesSpeech SynthesisComputer ScienceAutomatic SystemsSpeech CommunicationSpeech ProcessingSpeech PerceptionVoice TechnologySpeaker Recognition
In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, while an unknown attacker is a spoofing system whose output was not available to the countermeasures during training. Finally, we benchmark automatic systems against human performance on both speaker verification and spoofing detection tasks.
| Year | Citations | |
|---|---|---|
Page 1
Page 1