SAS: A Speaker Verification Spoofing Database Containing Diverse Attacks

Zhizheng Wu, Ali Khodabakhsh, Cenk Demiroglu, Junichi Yamagishi, Daisuke Saito, Tomoki Toda, Simon King

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice conversion. We design two protocols, one for standard speaker verification evaluation, and the other for producing spoofing materials. Hence, they allow the speech synthesis community to produce spoofing materials incrementally without knowledge of speaker verification spoofing and anti-spoofing. To provide a
set of preliminary results, we conducted speaker verification experiments using two state-of-the-art systems. Without any anti-spoofing techniques, the two systems are extremely vulnerable to the spoofing attacks implemented in our SAS corpus.
Original languageEnglish
Title of host publicationAcoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on
PublisherInstitute of Electrical and Electronics Engineers
Pages4440-4444
Number of pages5
DOIs
Publication statusPublished - 2015
EventIEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) - Brisbane, Australia, Australia
Duration: 19 Apr 201524 Apr 2015

Conference

ConferenceIEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Country/TerritoryAustralia
CityBrisbane, Australia
Period19/04/1524/04/15

Fingerprint

Dive into the research topics of 'SAS: A Speaker Verification Spoofing Database Containing Diverse Attacks'. Together they form a unique fingerprint.

Cite this