Show simple item record

dc.contributor.authorWu, Z.
dc.contributor.authorKhodabakhsh, Ali
dc.contributor.authorDemiroğlu, Cenk
dc.contributor.authorYamagishi, J.
dc.contributor.authorSaito, D.
dc.contributor.authorToda, T.
dc.contributor.authorKing, S.
dc.date.accessioned2016-02-15T13:38:34Z
dc.date.available2016-02-15T13:38:34Z
dc.date.issued2015
dc.identifier.issn1520-6149
dc.identifier.urihttp://hdl.handle.net/10679/2379
dc.identifier.urihttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=7178810
dc.descriptionDue to copyright restrictions, the access to the full text of this article is only available via subscription.
dc.description.abstractThis paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice conversion. We design two protocols, one for standard speaker verification evaluation, and the other for producing spoofing materials. Hence, they allow the speech synthesis community to produce spoofing materials incrementally without knowledge of speaker verification spoofing and anti-spoofing. To provide a set of preliminary results, we conducted speaker verification experiments using two state-of-the-art systems. Without any anti-spoofing techniques, the two systems are extremely vulnerable to the spoofing attacks implemented in our SAS corpus.
dc.description.sponsorshipEPSRC ; CAF ; TÜBİTAK
dc.language.isoengen_US
dc.publisherIEEE
dc.relationinfo:turkey/grantAgreement/TUBITAK/112E160
dc.relation.ispartof2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
dc.rightsrestrictedAccess
dc.titleSAS : A speaker verification spoofing database containing diverse attacksen_US
dc.typeConference paperen_US
dc.peerreviewedyes
dc.publicationstatuspublisheden_US
dc.contributor.departmentÖzyeğin University
dc.contributor.authorID(ORCID 0000-0002-6160-3169 & YÖK ID 144947) Demiroğlu, Cenk
dc.contributor.ozuauthorDemiroğlu, Cenk
dc.identifier.startpage4440
dc.identifier.endpage4444
dc.identifier.wosWOS:000368452404116
dc.identifier.doi10.1109/ICASSP.2015.7178810
dc.subject.keywordsDatabase management systems
dc.subject.keywordsSecurity of data
dc.subject.keywordsSpeaker recognition
dc.subject.keywordsSpeech synthesis
dc.identifier.scopusSCOPUS:2-s2.0-84946070918
dc.contributor.ozugradstudentKhodabakhsh, Ali
dc.contributor.authorMale2
dc.relation.publicationcategoryConference Paper - International - Institutional Academic Staff and Graduate Student


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record


Share this page