Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
dc.contributor.author | Wu, Z. | |
dc.contributor.author | Leon, P. L. de | |
dc.contributor.author | Demiroğlu, Cenk | |
dc.contributor.author | Khodabakhsh, Ali | |
dc.date.accessioned | 2016-06-29T13:04:29Z | |
dc.date.available | 2016-06-29T13:04:29Z | |
dc.date.issued | 2016-04 | |
dc.identifier.issn | 2329-9290 | |
dc.identifier.uri | http://hdl.handle.net/10679/4086 | |
dc.identifier.uri | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7400997&tag=1 | |
dc.description | Due to copyright restrictions, the access to the full text of this article is only available via subscription. | |
dc.description.abstract | In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, while an unknown attacker is a spoofing system whose output was not available to the countermeasures during training. Finally, we benchmark automatic systems against human performance on both speaker verification and spoofing detection tasks. | |
dc.description.sponsorship | EPSRC ; TÜBİTAK | |
dc.language.iso | eng | en_US |
dc.publisher | IEEE | |
dc.relation | info:turkey/grantAgreement/TUBITAK/112E160 | |
dc.relation.ispartof | IEEE/ACM Transactions on Speech and Language Processing | |
dc.rights | restrictedAccess | |
dc.title | Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance | en_US |
dc.type | Article | en_US |
dc.peerreviewed | yes | |
dc.publicationstatus | published | en_US |
dc.contributor.department | Özyeğin University | |
dc.contributor.authorID | (ORCID 0000-0002-6160-3169 & YÖK ID 144947) Demiroğlu, Cenk | |
dc.contributor.ozuauthor | Demiroğlu, Cenk | |
dc.identifier.volume | 24 | |
dc.identifier.startpage | 768 | |
dc.identifier.endpage | 783 | |
dc.identifier.wos | WOS:000372620600003 | |
dc.identifier.doi | 10.1109/TASLP.2016.2526653 | |
dc.subject.keywords | Speaker verification | |
dc.subject.keywords | Speech synthesis | |
dc.subject.keywords | Voice conversion | |
dc.subject.keywords | Spoofing attack | |
dc.subject.keywords | Anti-spoofing | |
dc.subject.keywords | Countermeasure | |
dc.subject.keywords | Security | |
dc.identifier.scopus | SCOPUS:2-s2.0-84962901047 | |
dc.contributor.ozugradstudent | Khodabakhsh, Ali | |
dc.contributor.authorMale | 2 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
Share this page