scispace - formally typeset
Journal ArticleDOI

Playback attack detection for text-dependent speaker verification over telephone channels

TLDR
The findings demonstrate that such spoofing-oriented playback attacks can be effectively detected and should not be considered a significant argument against applications of text-dependent speaker verification.
About
This article is published in Speech Communication.The article was published on 2015-03-01. It has received 75 citations till now. The article focuses on the topics: Passphrase & Spoofing attack.

read more

Citations
More filters
Proceedings ArticleDOI

The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection

TL;DR: ASVspoof 2017, the second in the series, focused on the development of replay attack countermeasures and indicates that the quest for countermeasures which are resilient in the face of variable replay attacks remains very much alive.
Proceedings ArticleDOI

Audio Replay Attack Detection Using High-Frequency Features.

TL;DR: This paper addresses a replay spoofing attack against a speaker recognition system by detecting that the analysed signal has passed through multiple analogue-to-digital conversions by modelling the subband spectrum and using the proposed features derived from the linear prediction analysis.
Proceedings ArticleDOI

RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research

TL;DR: A new database designed to support the development of replay spoofing countermeasures tailored towards the protection of text-dependent ASV systems from replay attacks in the face of variable recording and playback conditions, derived from the re-recording of the original RedDots database.
Proceedings ArticleDOI

Spoof detection using source, instantaneous frequency and cepstral features

TL;DR: The main focus of this work is on exploiting the differences in the speech-specific nature of genuine speech signals and spoofed speech signals generated by replay attacks.
Proceedings ArticleDOI

Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification

TL;DR: Pop noise detection algorithms are proposed and it is shown through an experimental study that they can be used to discriminate live voice signals from artificial ones generated by means of speech synthesis techniques.
References
More filters
Proceedings Article

The DET Curve in Assessment of Detection Task Performance

TL;DR: The DET Curve is introduced as a means of representing performance on detection tasks that involve a tradeoff of error types and why it is likely to produce approximately linear curves.
Patent

Speech audio process

TL;DR: This speech processes engine adopts the Kalman filtering with the glottis information of specific first speaker to purify audio speech signal, thus realizes more effective automatic speech recognition.
Proceedings Article

An Industrial Strength Audio Search Algorithm.

TL;DR: The algorithm is noise and distortion resistant, computationally efficient, and massively scalable, capable of quickly identifying a short segment of music captured through a cellphone microphone in the presence of foreground voices and other dominant noise, out of a database of over a million tracks.
Journal ArticleDOI

Text-dependent speaker verification: Classifiers, databases and RSR2015

TL;DR: The HiLAM system, based on a three layer acoustic architecture, and an i-vector/PLDA system, outperforms the state-of-the-art i- vector system in most of the scenarios and provides a reference evaluation scheme and a reference performance on RSR2015 database to the research community.
Proceedings ArticleDOI

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech

TL;DR: Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks, but even it experiences more than 5-fold increase in the false acceptance rate.
Related Papers (5)