Can large-scale vocoded spoofed data improve speech spoofing countermeasure with a self-supervised front end?
A speech spoofing countermeasure (CM) that discriminates between unseen spoofed and
bona fide data requires diverse training data. While many datasets use spoofed data …
bona fide data requires diverse training data. While many datasets use spoofed data …
a-DCF: an architecture agnostic metric with application to spoofing-robust speaker verification
Spoofing detection is today a mainstream research topic. Standard metrics can be applied to
evaluate the performance of isolated spoofing detection solutions and others have been …
evaluate the performance of isolated spoofing detection solutions and others have been …
Optimizing a-dcf for spoofing-robust speaker verification
Automatic speaker verification (ASV) systems are vulnerable to spoofing attacks. We
propose a spoofing-robust ASV system optimized directly for the recently introduced …
propose a spoofing-robust ASV system optimized directly for the recently introduced …
SpoofCeleb: Speech Deepfake Detection and SASV In The Wild
This paper introduces SpoofCeleb, a dataset designed for Speech Deepfake Detection
(SDD) and Spoofing-robust Automatic Speaker Verification (SASV), utilizing source data …
(SDD) and Spoofing-robust Automatic Speaker Verification (SASV), utilizing source data …
To what extent can ASV systems naturally defend against spoofing attacks?
The current automatic speaker verification (ASV) task involves making binary decisions on
two types of trials: target and non-target. However, emerging advancements in speech …
two types of trials: target and non-target. However, emerging advancements in speech …
SecureSpectra: Safeguarding Digital Identity from Deep Fake Threats via Intelligent Signatures
Advancements in DeepFake (DF) audio models pose a significant threat to voice
authentication systems, leading to unauthorized access and the spread of misinformation …
authentication systems, leading to unauthorized access and the spread of misinformation …
[PDF][PDF] Signal and Neural Processing against Spoofing Attacks and Deepfakes for Secure Voice Interaction (ASASVI)
The increasing sophistication of multimodal interaction systems, which enable human-like
communication, raises concerns regarding the authenticity of exchanged speech data. Our …
communication, raises concerns regarding the authenticity of exchanged speech data. Our …
Speech Watermarking removal by DNN-based Speech Enhancement Attacks
Á López López, ÁM Gómez García, E Roselló Casado - 2024 - digibug.ugr.es
Audio watermarking allows for embedding a bitstream in an audio file while ensuring the
introduced alteration remains im-perceptible. Although its primary application has been in …
introduced alteration remains im-perceptible. Although its primary application has been in …
Signal and Neural Processing against Spoofing Attacks and Deepfakes for Secure Voice Interaction (ASASVI)
ÁM Gómez García, AM Peinado Herreros… - 2024 - digibug.ugr.es
The increasing sophistication of multimodal interaction sys-tems, which enable human-like
communication, raises concerns regarding the authenticity of exchanged speech data. Our …
communication, raises concerns regarding the authenticity of exchanged speech data. Our …