Introduction to voice presentation attack detection and recent advances
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …
The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection
The ASVspoof initiative was created to promote the development of countermeasures which
aim to protect automatic speaker verification (ASV) from spoofing attacks. The first …
aim to protect automatic speaker verification (ASV) from spoofing attacks. The first …
Towards end-to-end synthetic speech detection
The constant Q transform (CQT) has been shown to be one of the most effective speech
signal pre-transforms to facilitate synthetic speech detection, followed by either hand-crafted …
signal pre-transforms to facilitate synthetic speech detection, followed by either hand-crafted …
Investigating self-supervised front ends for speech spoofing countermeasures
Self-supervised speech model is a rapid progressing research topic, and many pre-trained
models have been released and used in various down stream tasks. For speech anti …
models have been released and used in various down stream tasks. For speech anti …
Voice spoofing detector: A unified anti-spoofing framework
Voice controlled systems (VCS) in Internet of Things (IoT), speaker verification systems,
voice-based biometrics, and other voice-assistant-enabled systems are vulnerable to …
voice-based biometrics, and other voice-assistant-enabled systems are vulnerable to …
An overview of Indian spoken language recognition from machine learning perspective
Automatic spoken language identification (LID) is a very important research field in the era of
multilingual voice-command-based human-computer interaction. A front-end LID module …
multilingual voice-command-based human-computer interaction. A front-end LID module …
Towards protecting cyber-physical and IoT systems from single-and multi-order voice spoofing attacks
Abstract Voice-controlled systems (VCSs), a new class of cyber-physical systems (CPS), and
Internet of Things (IoT) devices are increasingly employing smart speakers such as Google …
Internet of Things (IoT) devices are increasingly employing smart speakers such as Google …
A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
The emergence of biometric technology provides enhanced security compared to the
traditional identification and authentication techniques that were less efficient and secure …
traditional identification and authentication techniques that were less efficient and secure …
[PDF][PDF] Novel Variable Length Teager Energy Separation Based Instantaneous Frequency Features for Replay Detection.
Replay attacks presents a great risk for Automatic Speaker Verification (ASV) system. In this
paper, we propose a novel replay detector based on Variable length Teager Energy …
paper, we propose a novel replay detector based on Variable length Teager Energy …
An empirical study on channel effects for synthetic voice spoofing countermeasure systems
Spoofing countermeasure (CM) systems are critical in speaker verification; they aim to
discern spoofing attacks from bona fide speech trials. In practice, however, acoustic …
discern spoofing attacks from bona fide speech trials. In practice, however, acoustic …