Can large-scale vocoded spoofed data improve speech spoofing countermeasure with a self-supervised front end?

X Wang, J Yamagishi - ICASSP 2024-2024 IEEE International …, 2024 - ieeexplore.ieee.org
A speech spoofing countermeasure (CM) that discriminates between unseen spoofed and
bona fide data requires diverse training data. While many datasets use spoofed data …

a-DCF: an architecture agnostic metric with application to spoofing-robust speaker verification

H Shim, J Jung, T Kinnunen, N Evans… - arxiv preprint arxiv …, 2024 - arxiv.org
Spoofing detection is today a mainstream research topic. Standard metrics can be applied to
evaluate the performance of isolated spoofing detection solutions and others have been …

Optimizing a-dcf for spoofing-robust speaker verification

O Kurnaz, J Mishra, TH Kinnunen, C Hanilçi - arxiv preprint arxiv …, 2024 - arxiv.org
Automatic speaker verification (ASV) systems are vulnerable to spoofing attacks. We
propose a spoofing-robust ASV system optimized directly for the recently introduced …

SpoofCeleb: Speech Deepfake Detection and SASV In The Wild

J Jung, Y Wu, X Wang, JH Kim, S Maiti… - IEEE Open Journal …, 2025 - ieeexplore.ieee.org
This paper introduces SpoofCeleb, a dataset designed for Speech Deepfake Detection
(SDD) and Spoofing-robust Automatic Speaker Verification (SASV), utilizing source data …

To what extent can ASV systems naturally defend against spoofing attacks?

J Jung, X Wang, N Evans, S Watanabe, H Shim… - arxiv preprint arxiv …, 2024 - arxiv.org
The current automatic speaker verification (ASV) task involves making binary decisions on
two types of trials: target and non-target. However, emerging advancements in speech …

SecureSpectra: Safeguarding Digital Identity from Deep Fake Threats via Intelligent Signatures

O Baser, K Kale, SP Chinchali - arxiv preprint arxiv:2407.00913, 2024 - arxiv.org
Advancements in DeepFake (DF) audio models pose a significant threat to voice
authentication systems, leading to unauthorized access and the spread of misinformation …

[PDF][PDF] Signal and Neural Processing against Spoofing Attacks and Deepfakes for Secure Voice Interaction (ASASVI)

AM Gómez, AM Peinado, VE Sánchez… - Proc. IberSPEECH …, 2024 - isca-archive.org
The increasing sophistication of multimodal interaction systems, which enable human-like
communication, raises concerns regarding the authenticity of exchanged speech data. Our …

Speech Watermarking removal by DNN-based Speech Enhancement Attacks

Á López López, ÁM Gómez García, E Roselló Casado - 2024 - digibug.ugr.es
Audio watermarking allows for embedding a bitstream in an audio file while ensuring the
introduced alteration remains im-perceptible. Although its primary application has been in …

Signal and Neural Processing against Spoofing Attacks and Deepfakes for Secure Voice Interaction (ASASVI)

ÁM Gómez García, AM Peinado Herreros… - 2024 - digibug.ugr.es
The increasing sophistication of multimodal interaction sys-tems, which enable human-like
communication, raises concerns regarding the authenticity of exchanged speech data. Our …