Wu, Z.Leon, P. L. deDemiroğlu, CenkKhodabakhsh, Ali2016-06-292016-06-292016-042329-9290http://hdl.handle.net/10679/4086https://doi.org/10.1109/TASLP.2016.2526653Due to copyright restrictions, the access to the full text of this article is only available via subscription.In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, while an unknown attacker is a spoofing system whose output was not available to the countermeasures during training. Finally, we benchmark automatic systems against human performance on both speaker verification and spoofing detection tasks.engrestrictedAccessAnti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performancearticle2476878300037262060000310.1109/TASLP.2016.2526653Speaker verificationSpeech synthesisVoice conversionSpoofing attackAnti-spoofingCountermeasureSecurity2-s2.0-84962901047