Journal ArticleDOI
Playback attack detection for text-dependent speaker verification over telephone channels
TLDR
The findings demonstrate that such spoofing-oriented playback attacks can be effectively detected and should not be considered a significant argument against applications of text-dependent speaker verification.About:
This article is published in Speech Communication.The article was published on 2015-03-01. It has received 75 citations till now. The article focuses on the topics: Passphrase & Spoofing attack.read more
Citations
More filters
Proceedings ArticleDOI
The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection
Tomi Kinnunen,Md. Sahidullah,Héctor Delgado,Massimiliano Todisco,Nicholas Evans,Junichi Yamagishi,Kong Aik Lee +6 more
TL;DR: ASVspoof 2017, the second in the series, focused on the development of replay attack countermeasures and indicates that the quest for countermeasures which are resilient in the face of variable replay attacks remains very much alive.
Proceedings ArticleDOI
Audio Replay Attack Detection Using High-Frequency Features.
TL;DR: This paper addresses a replay spoofing attack against a speaker recognition system by detecting that the analysed signal has passed through multiple analogue-to-digital conversions by modelling the subband spectrum and using the proposed features derived from the linear prediction analysis.
Proceedings ArticleDOI
RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research
Tomi Kinnunen,Sahidullah,Mauro Falcone,Luca Costantini,Rosa González Hautamäki,Dennis Alexander Lehmann Thomsen,Achintya Kumar Sarkar,Zheng-Hua Tan,Héctor Delgado,Massimiliano Todisco,Nicholas Evans,Ville Hautamäki,Kong Aik Lee +12 more
TL;DR: A new database designed to support the development of replay spoofing countermeasures tailored towards the protection of text-dependent ASV systems from replay attacks in the face of variable recording and playback conditions, derived from the re-recording of the original RedDots database.
Proceedings ArticleDOI
Spoof detection using source, instantaneous frequency and cepstral features
TL;DR: The main focus of this work is on exploiting the differences in the speech-specific nature of genuine speech signals and spoofed speech signals generated by replay attacks.
Proceedings ArticleDOI
Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification
Sayaka Shiota,Fernando Villavicencio,Junichi Yamagishi,Nobutaka Ono,Isao Echizen,Tomoko Matsui +5 more
TL;DR: Pop noise detection algorithms are proposed and it is shown through an experimental study that they can be used to discriminate live voice signals from artificial ones generated by means of speech synthesis techniques.
References
More filters
Proceedings Article
The DET Curve in Assessment of Detection Task Performance
TL;DR: The DET Curve is introduced as a means of representing performance on detection tasks that involve a tradeoff of error types and why it is likely to produce approximately linear curves.
Patent
Speech audio process
TL;DR: This speech processes engine adopts the Kalman filtering with the glottis information of specific first speaker to purify audio speech signal, thus realizes more effective automatic speech recognition.
Proceedings Article
An Industrial Strength Audio Search Algorithm.
TL;DR: The algorithm is noise and distortion resistant, computationally efficient, and massively scalable, capable of quickly identifying a short segment of music captured through a cellphone microphone in the presence of foreground voices and other dominant noise, out of a database of over a million tracks.
Journal ArticleDOI
Text-dependent speaker verification: Classifiers, databases and RSR2015
TL;DR: The HiLAM system, based on a three layer acoustic architecture, and an i-vector/PLDA system, outperforms the state-of-the-art i- vector system in most of the scenarios and provides a reference evaluation scheme and a reference performance on RSR2015 database to the research community.
Proceedings ArticleDOI
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
TL;DR: Experiments on a subset of NIST 2006 SRE corpus indicate that the JFA method is most resilient against conversion attacks, but even it experiences more than 5-fold increase in the false acceptance rate.