Projects per year
Abstract / Description of output
In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, whilst an unknown attacker is a spoofing system whose output was not available to the countermeasures during training. Finally, we benchmark automatic systems against human performance on both speaker verification and spoofing detection tasks.
Original language | English |
---|---|
Pages (from-to) | 768 - 783 |
Number of pages | 17 |
Journal | IEEE/ACM Transactions on Audio, Speech and Language Processing |
Volume | 24 |
Issue number | 4 |
Early online date | 8 Feb 2016 |
DOIs | |
Publication status | Published - Apr 2016 |
Fingerprint
Dive into the research topics of 'Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance'. Together they form a unique fingerprint.Projects
- 2 Finished
-
Deep architectures for statistical speech synthesis
Yamagishi, J.
UK industry, commerce and public corporations
4/09/12 → 3/03/16
Project: Research
-
Datasets
-
Spoofing and Anti-Spoofing (SAS) corpus v1.0
Wu, Z. (Creator), Khodabakhsh, A. (Creator), Yamagishi, J. (Creator), Saito, D. (Creator), Toda, T. (Creator), Ling, Z. (Creator), King, S. (Creator) & Demiroglu, C. (Creator), Edinburgh DataShare, 27 May 2015
DOI: 10.7488/ds/252, http://www.zhizheng.org/papers/icassp2015_sas.pdf
Dataset