Introduction to voice presentation attack detection and recent advances

M Sahidullah, H Delgado, M Todisco, A Nautsch… - Handbook of Biometric …, 2023 - Springer
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …

The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection

T Kinnunen, M Sahidullah, H Delgado… - Interspeech …, 2017 - research.ed.ac.uk
The ASVspoof initiative was created to promote the development of countermeasures which
aim to protect automatic speaker verification (ASV) from spoofing attacks. The first …

Towards end-to-end synthetic speech detection

G Hua, ABJ Teoh, H Zhang - IEEE Signal Processing Letters, 2021 - ieeexplore.ieee.org
The constant Q transform (CQT) has been shown to be one of the most effective speech
signal pre-transforms to facilitate synthetic speech detection, followed by either hand-crafted …

Investigating self-supervised front ends for speech spoofing countermeasures

X Wang, J Yamagishi - arxiv preprint arxiv:2111.07725, 2021 - arxiv.org
Self-supervised speech model is a rapid progressing research topic, and many pre-trained
models have been released and used in various down stream tasks. For speech anti …

Voice spoofing detector: A unified anti-spoofing framework

A Javed, KM Malik, H Malik, A Irtaza - Expert Systems with Applications, 2022 - Elsevier
Voice controlled systems (VCS) in Internet of Things (IoT), speaker verification systems,
voice-based biometrics, and other voice-assistant-enabled systems are vulnerable to …

An overview of Indian spoken language recognition from machine learning perspective

S Dey, M Sahidullah, G Saha - ACM Transactions on Asian and Low …, 2022 - dl.acm.org
Automatic spoken language identification (LID) is a very important research field in the era of
multilingual voice-command-based human-computer interaction. A front-end LID module …

Towards protecting cyber-physical and IoT systems from single-and multi-order voice spoofing attacks

A Javed, KM Malik, A Irtaza, H Malik - Applied Acoustics, 2021 - Elsevier
Abstract Voice-controlled systems (VCSs), a new class of cyber-physical systems (CPS), and
Internet of Things (IoT) devices are increasingly employing smart speakers such as Google …

A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction

CB Tan, MHA Hijazi, N Khamis… - Multimedia Tools and …, 2021 - Springer
The emergence of biometric technology provides enhanced security compared to the
traditional identification and authentication techniques that were less efficient and secure …

[PDF][PDF] Novel Variable Length Teager Energy Separation Based Instantaneous Frequency Features for Replay Detection.

HA Patil, MR Kamble, TB Patel, MH Soni - INTERSPEECH, 2017 - researchgate.net
Replay attacks presents a great risk for Automatic Speaker Verification (ASV) system. In this
paper, we propose a novel replay detector based on Variable length Teager Energy …

An empirical study on channel effects for synthetic voice spoofing countermeasure systems

Y Zhang, G Zhu, F Jiang, Z Duan - arxiv preprint arxiv:2104.01320, 2021 - arxiv.org
Spoofing countermeasure (CM) systems are critical in speaker verification; they aim to
discern spoofing attacks from bona fide speech trials. In practice, however, acoustic …