Spoofing and countermeasures for speaker verification: A survey

Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre… - speech …, 2015 - Elsevier
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …

Voice conversion versus speaker verification: an overview

Z Wu, H Li - APSIPA Transactions on Signal and Information …, 2014 - cambridge.org
A speaker verification system automatically accepts or rejects a claimed identity of a speaker
based on a speech sample. Recently, a major progress was made in speaker verification …

Advances in anti-spoofing: from the perspective of ASVspoof challenges

MR Kamble, HB Sailor, HA Patil, H Li - APSIPA Transactions on …, 2020 - cambridge.org
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

T Kinnunen, ZZ Wu, KA Lee, F Sedlak… - … , Speech and Signal …, 2012 - ieeexplore.ieee.org
Voice conversion-the methodology of automatically converting one's utterances to sound as
if spoken by another speaker-presents a threat for applications relying on speaker …

Re-assessing the threat of replay spoofing attacks against automatic speaker verification

F Alegre, A Janicki, N Evans - 2014 International conference of …, 2014 - ieeexplore.ieee.org
This paper re-examines the threat of spoofing or presentation attacks in the context of
automatic speaker verification (ASV). While voice conversion and speech synthesis attacks …

A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns

F Alegre, A Amehraye, N Evans - 2013 IEEE Sixth International …, 2013 - ieeexplore.ieee.org
The vulnerability of automatic speaker verification systems to spoofing is now well accepted.
While recent work has shown the potential to develop countermeasures capable of detecting …

A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case

Z Wu, T Kinnunen, ES Chng, H Li… - Proceedings of The …, 2012 - ieeexplore.ieee.org
Voice conversion technique, which modifies one speaker's (source) voice to sound like
another speaker (target), presents a threat to automatic speaker verification. In this paper …

Spoofing countermeasures to protect automatic speaker verification from voice conversion

F Alegre, A Amehraye, N Evans - 2013 IEEE international …, 2013 - ieeexplore.ieee.org
This paper presents a new countermeasure for the protection of automatic speaker
verification systems from spoofed, converted voice signals. The new countermeasure …

Privacy and utility of x-vector based speaker anonymization

BML Srivastava, M Maouche… - … on Audio, Speech …, 2022 - ieeexplore.ieee.org
We study the scenario where individuals (speakers) contribute to the publication of an
anonymized speech corpus. Data users leverage this public corpus for downstream tasks …

An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks

A Janicki, F Alegre, N Evans - Security and Communication …, 2016 - Wiley Online Library
This paper analyses the threat of replay spoofing or presentation attacks in the context of
automatic speaker verification. As relatively high‐technology attacks, speech synthesis and …