Publication:
SAS : A speaker verification spoofing database containing diverse attacks

dc.contributor.authorWu, Z.
dc.contributor.authorKhodabakhsh, Ali
dc.contributor.authorDemiroğlu, Cenk
dc.contributor.authorYamagishi, J.
dc.contributor.authorSaito, D.
dc.contributor.authorToda, T.
dc.contributor.authorKing, S.
dc.contributor.departmentElectrical & Electronics Engineering
dc.contributor.ozuauthorDEMİROĞLU, Cenk
dc.contributor.ozugradstudentKhodabakhsh, Ali
dc.date.accessioned2016-02-15T13:38:34Z
dc.date.available2016-02-15T13:38:34Z
dc.date.issued2015
dc.descriptionDue to copyright restrictions, the access to the full text of this article is only available via subscription.
dc.description.abstractThis paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice conversion. We design two protocols, one for standard speaker verification evaluation, and the other for producing spoofing materials. Hence, they allow the speech synthesis community to produce spoofing materials incrementally without knowledge of speaker verification spoofing and anti-spoofing. To provide a set of preliminary results, we conducted speaker verification experiments using two state-of-the-art systems. Without any anti-spoofing techniques, the two systems are extremely vulnerable to the spoofing attacks implemented in our SAS corpus.
dc.description.sponsorshipEPSRC ; CAF ; TÜBİTAK
dc.identifier.doi10.1109/ICASSP.2015.7178810
dc.identifier.endpage4444
dc.identifier.issn1520-6149
dc.identifier.scopus2-s2.0-84946070918
dc.identifier.startpage4440
dc.identifier.urihttp://hdl.handle.net/10679/2379
dc.identifier.urihttps://doi.org/10.1109/ICASSP.2015.7178810
dc.identifier.wos000368452404116
dc.language.isoengen_US
dc.peerreviewedyes
dc.publicationstatuspublisheden_US
dc.publisherIEEE
dc.relationinfo:turkey/grantAgreement/TUBITAK/112E160
dc.relation.ispartof2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
dc.relation.publicationcategoryInternational
dc.rightsinfo:eu-repo/semantics/restrictedAccess
dc.subject.keywordsDatabase management systems
dc.subject.keywordsSecurity of data
dc.subject.keywordsSpeaker recognition
dc.subject.keywordsSpeech synthesis
dc.titleSAS : A speaker verification spoofing database containing diverse attacksen_US
dc.typeConference paperen_US
dspace.entity.typePublication
relation.isOrgUnitOfPublication7b58c5c4-dccc-40a3-aaf2-9b209113b763
relation.isOrgUnitOfPublication.latestForDiscovery7b58c5c4-dccc-40a3-aaf2-9b209113b763

Files

Collections