Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z **, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Advances in anti-spoofing: from the perspective of ASVspoof challenges

MR Kamble, HB Sailor, HA Patil, H Li - APSIPA Transactions on …, 2020 - cambridge.org
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …

A study on replay attack and anti-spoofing for text-dependent speaker verification

Z Wu, S Gao, ES Cling, H Li - Signal and Information …, 2014 - ieeexplore.ieee.org
Replay, which is to playback a pre-recorded speech sample, presents a genuine risk to
automatic speaker verification technology. In this study, we evaluate the vulnerability of text …

[PDF][PDF] Spoofing and countermeasures for automatic speaker verification

NWD Evans, T Kinnunen… - … 2013, 14th Annual …, 2013 - research.ed.ac.uk
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also
known as imposture. While vulnerabilities and countermeasures for other biometric …

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

T Kinnunen, ZZ Wu, KA Lee, F Sedlak… - … , Speech and Signal …, 2012 - ieeexplore.ieee.org
Voice conversion-the methodology of automatically converting one's utterances to sound as
if spoken by another speaker-presents a threat for applications relying on speaker …

On the vulnerability of speaker verification to realistic voice spoofing

SK Ergünay, E Khoury, A Lazaridis… - 2015 IEEE 7th …, 2015 - ieeexplore.ieee.org
Automatic speaker verification (ASV) systems are subject to various kinds of malicious
attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the …

Introduction to voice presentation attack detection and recent advances

M Sahidullah, H Delgado, M Todisco, A Nautsch… - Handbook of Biometric …, 2023 - Springer
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …

[PDF][PDF] Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples.

Y Zhang, Z Jiang, J Villalba, N Dehak - Interspeech, 2020 - isca-archive.org
Spoofing countermeasure systems protect Automatic Speaker Verification (ASV) systems
from spoofing attacks such as replay, synthesis, and conversion. However, research has …

Re-assessing the threat of replay spoofing attacks against automatic speaker verification

F Alegre, A Janicki, N Evans - 2014 International conference of …, 2014 - ieeexplore.ieee.org
This paper re-examines the threat of spoofing or presentation attacks in the context of
automatic speaker verification (ASV). While voice conversion and speech synthesis attacks …