ASSERT: Anti-spoofing with squeeze-excitation and residual networks

CI Lai, N Chen, J Villalba, N Dehak - arxiv preprint arxiv:1904.01120, 2019 - arxiv.org
We present JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …

Advances in anti-spoofing: from the perspective of ASVspoof challenges

MR Kamble, HB Sailor, HA Patil, H Li - APSIPA Transactions on …, 2020 - cambridge.org
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …

Attentive filtering networks for audio replay attack detection

CI Lai, A Abad, K Richmond… - ICASSP 2019-2019 …, 2019 - ieeexplore.ieee.org
An attacker may use a variety of techniques to fool an automatic speaker verification system
into accepting them as a genuine user. Anti-spoofing methods meanwhile aim to make the …

Cross-modal information fusion for voice spoofing detection

J Xue, H Zhou, H Song, B Wu, L Shi - Speech Communication, 2023 - Elsevier
In recent years, speaker verification systems have been used in many production scenarios.
Unfortunately, they are still very vulnerable to different kinds of spoofing attacks, such as …

[PDF][PDF] The SJTU robust anti-spoofing system for the ASVspoof 2019 challenge.

Y Yang, H Wang, H Dinkel, Z Chen, S Wang, Y Qian… - Interspeech, 2019 - researchgate.net
The robustness of an anti-spoofing system is progressively more important in order to
develop a reliable speaker verification system. Previous challenges and datasets mainly …

Generalized voice spoofing detection via integral knowledge amalgamation

Y Ren, H Peng, L Li, X Xue, Y Lan… - IEEE/ACM Transactions …, 2023 - ieeexplore.ieee.org
Most of the voice spoofing detection methods are designed for specific kinds of spoofing
attacks, synthetic or replay. In practice, however, there is no prior information about these …

Countermeasures to replay attacks: A review

M Singh, D Pati - IETE Technical Review, 2020 - Taylor & Francis
Replay attack is an attempt of using pre-recorded speech samples of any target for acquiring
unauthorized access to the automatic speaker verification (ASV) system. It is a low …

Gammatone spectral latitude features extraction for pathological voice detection and classification

C Zhou, Y Wu, Z Fan, X Zhang, D Wu, Z Tao - Applied Acoustics, 2022 - Elsevier
To improve the performance of pathological voice detection and classification, gammatone
spectral latitude (GTSL) features were proposed. GTSL features are inspired by the …

A survey on replay attack detection for automatic speaker verification (ASV) system

HA Patil, MR Kamble - 2018 Asia-Pacific Signal and …, 2018 - ieeexplore.ieee.org
In this paper, we present a brief survey of various approaches used to detect replay attack
for Automatic Speaker Verification (ASV) system. The replay spoofing attack is the most …

New replay attack detection using iterative adaptive inverse filtering and high frequency band

KP Bharath, MR Kumar - Expert systems with Applications, 2022 - Elsevier
Replay attack is most vulnerable to automatic speaker verification system, where the frauds
get the access by replaying pre-recorded voice samples of the genuine speakers. In this …