Search
Now showing items 1-3 of 3
SAS : A speaker verification spoofing database containing diverse attacks
(IEEE, 2015)
This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice ...
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
(IEEE, 2017-06)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ...
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)
In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ...
Share this page