Spoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …
the technology can be susceptible to malicious spoofing attacks. The research community …
Voice conversion versus speaker verification: an overview
A speaker verification system automatically accepts or rejects a claimed identity of a speaker
based on a speech sample. Recently, a major progress was made in speaker verification …
based on a speech sample. Recently, a major progress was made in speaker verification …
Advances in anti-spoofing: from the perspective of ASVspoof challenges
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …
This leads to an increased interest to secure these voice biometric systems for real-world …
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
Voice conversion-the methodology of automatically converting one's utterances to sound as
if spoken by another speaker-presents a threat for applications relying on speaker …
if spoken by another speaker-presents a threat for applications relying on speaker …
Re-assessing the threat of replay spoofing attacks against automatic speaker verification
This paper re-examines the threat of spoofing or presentation attacks in the context of
automatic speaker verification (ASV). While voice conversion and speech synthesis attacks …
automatic speaker verification (ASV). While voice conversion and speech synthesis attacks …
A one-class classification approach to generalised speaker verification spoofing countermeasures using local binary patterns
The vulnerability of automatic speaker verification systems to spoofing is now well accepted.
While recent work has shown the potential to develop countermeasures capable of detecting …
While recent work has shown the potential to develop countermeasures capable of detecting …
A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case
Voice conversion technique, which modifies one speaker's (source) voice to sound like
another speaker (target), presents a threat to automatic speaker verification. In this paper …
another speaker (target), presents a threat to automatic speaker verification. In this paper …
Spoofing countermeasures to protect automatic speaker verification from voice conversion
This paper presents a new countermeasure for the protection of automatic speaker
verification systems from spoofed, converted voice signals. The new countermeasure …
verification systems from spoofed, converted voice signals. The new countermeasure …
Privacy and utility of x-vector based speaker anonymization
We study the scenario where individuals (speakers) contribute to the publication of an
anonymized speech corpus. Data users leverage this public corpus for downstream tasks …
anonymized speech corpus. Data users leverage this public corpus for downstream tasks …
An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks
This paper analyses the threat of replay spoofing or presentation attacks in the context of
automatic speaker verification. As relatively high‐technology attacks, speech synthesis and …
automatic speaker verification. As relatively high‐technology attacks, speech synthesis and …