Show simple item record

dc.contributor.authorWu, Z.
dc.contributor.authorLeon, P. L. de
dc.contributor.authorDemiroğlu, Cenk
dc.contributor.authorKhodabakhsh, Ali
dc.date.accessioned2016-06-29T13:04:29Z
dc.date.available2016-06-29T13:04:29Z
dc.date.issued2016-04
dc.identifier.issn2329-9290
dc.identifier.urihttp://hdl.handle.net/10679/4086
dc.identifier.urihttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7400997&tag=1
dc.descriptionDue to copyright restrictions, the access to the full text of this article is only available via subscription.
dc.description.abstractIn this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, while an unknown attacker is a spoofing system whose output was not available to the countermeasures during training. Finally, we benchmark automatic systems against human performance on both speaker verification and spoofing detection tasks.
dc.description.sponsorshipEPSRC ; TÜBİTAK
dc.language.isoengen_US
dc.publisherIEEE
dc.relationinfo:turkey/grantAgreement/TUBITAK/112E160
dc.relation.ispartofIEEE/ACM Transactions on Speech and Language Processing
dc.rightsrestrictedAccess
dc.titleAnti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performanceen_US
dc.typeArticleen_US
dc.peerreviewedyes
dc.publicationstatuspublisheden_US
dc.contributor.departmentÖzyeğin University
dc.contributor.authorID(ORCID 0000-0002-6160-3169 & YÖK ID 144947) Demiroğlu, Cenk
dc.contributor.ozuauthorDemiroğlu, Cenk
dc.identifier.volume24
dc.identifier.startpage768
dc.identifier.endpage783
dc.identifier.wosWOS:000372620600003
dc.identifier.doi10.1109/TASLP.2016.2526653
dc.subject.keywordsSpeaker verification
dc.subject.keywordsSpeech synthesis
dc.subject.keywordsVoice conversion
dc.subject.keywordsSpoofing attack
dc.subject.keywordsAnti-spoofing
dc.subject.keywordsCountermeasure
dc.subject.keywordsSecurity
dc.identifier.scopusSCOPUS:2-s2.0-84962901047
dc.contributor.ozugradstudentKhodabakhsh, Ali
dc.contributor.authorMale2


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record


Share this page