Browsing by Author "Wu, Z."
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
ArticlePublication Metadata only Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance(IEEE, 2016-04) Wu, Z.; Leon, P. L. de; Demiroğlu, Cenk; Khodabakhsh, Ali; Electrical & Electronics Engineering; DEMİROĞLU, Cenk; Khodabakhsh, AliIn this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, while an unknown attacker is a spoofing system whose output was not available to the countermeasures during training. Finally, we benchmark automatic systems against human performance on both speaker verification and spoofing detection tasks.Biographical-ItemPublication Open Access Professor Bengt Sundén on his 70th birthday(Elsevier, 2019-10) Faghri, M.; Amano, R.; Cheng, P.; Chiu, W.; Djilali, N.; Ekkad, S.; Farhanieh, B.; Han, J.- C.; Jaluria, Y.; Kabelac, S.; Kakac, S.; Karayiannis, T.; Karvinen, R.; Lewis, R.; Manca, O.; Mengüç, Mustafa Pınar; Minkowycz, W. J.; Muley, A.; Murray, D.; Olsson, C. - O.; Szmyd, J.; Tao, W.; Wang, L.; Wang, Q.; Wei, J.; Wu, Z.; Xie, G.; Xuan, Y.; Yuan, J.; Zhao, T.; Mechanical Engineering; MENGÜÇ, Mustafa PınarN/AConference ObjectPublication Metadata only SAS : A speaker verification spoofing database containing diverse attacks(IEEE, 2015) Wu, Z.; Khodabakhsh, Ali; Demiroğlu, Cenk; Yamagishi, J.; Saito, D.; Toda, T.; King, S.; Electrical & Electronics Engineering; DEMİROĞLU, Cenk; Khodabakhsh, AliThis paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice conversion. We design two protocols, one for standard speaker verification evaluation, and the other for producing spoofing materials. Hence, they allow the speech synthesis community to produce spoofing materials incrementally without knowledge of speaker verification spoofing and anti-spoofing. To provide a set of preliminary results, we conducted speaker verification experiments using two state-of-the-art systems. Without any anti-spoofing techniques, the two systems are extremely vulnerable to the spoofing attacks implemented in our SAS corpus.