Spoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …
the technology can be susceptible to malicious spoofing attacks. The research community …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Advances in anti-spoofing: from the perspective of ASVspoof challenges
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …
This leads to an increased interest to secure these voice biometric systems for real-world …
A study on replay attack and anti-spoofing for text-dependent speaker verification
Replay, which is to playback a pre-recorded speech sample, presents a genuine risk to
automatic speaker verification technology. In this study, we evaluate the vulnerability of text …
automatic speaker verification technology. In this study, we evaluate the vulnerability of text …
[PDF][PDF] Spoofing and countermeasures for automatic speaker verification
NWD Evans, T Kinnunen… - … 2013, 14th Annual …, 2013 - research.ed.ac.uk
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also
known as imposture. While vulnerabilities and countermeasures for other biometric …
known as imposture. While vulnerabilities and countermeasures for other biometric …
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
Voice conversion-the methodology of automatically converting one's utterances to sound as
if spoken by another speaker-presents a threat for applications relying on speaker …
if spoken by another speaker-presents a threat for applications relying on speaker …
On the vulnerability of speaker verification to realistic voice spoofing
Automatic speaker verification (ASV) systems are subject to various kinds of malicious
attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the …
attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the …
Introduction to voice presentation attack detection and recent advances
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …
[PDF][PDF] Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples.
Spoofing countermeasure systems protect Automatic Speaker Verification (ASV) systems
from spoofing attacks such as replay, synthesis, and conversion. However, research has …
from spoofing attacks such as replay, synthesis, and conversion. However, research has …
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
This paper re-examines the threat of spoofing or presentation attacks in the context of
automatic speaker verification (ASV). While voice conversion and speech synthesis attacks …
automatic speaker verification (ASV). While voice conversion and speech synthesis attacks …