The attacker's perspective on automatic speaker verification: An overview

RK Das, X Tian, T Kinnunen, H Li - arXiv preprint arXiv:2004.08849, 2020 - arxiv.org
Security of automatic speaker verification (ASV) systems is compromised by various
spoofing attacks. While many types of non-proactive attacks (and their defenses) have been …

ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech

X Wang, J Yamagishi, M Todisco, H Delgado… - Computer Speech & …, 2020 - Elsevier
Automatic speaker verification (ASV) is one of the most natural and convenient means of
biometric person recognition. Unfortunately, just like all other biometric systems, ASV is …

[PDF][PDF] Generalization of Audio Deepfake Detection.

T Chen, A Kumar, P Nagarsheth, G Sivaraman… - Odyssey, 2020 - researchgate.net
Audio Deepfakes, technically known as logical-access voice spoofing techniques, have
become an increased threat on voice interfaces due to the recent breakthroughs in speech …

Light convolutional neural network with feature genuinization for detection of synthetic speech attacks

Z Wu, RK Das, J Yang, H Li - arXiv preprint arXiv:2009.09637, 2020 - arxiv.org
Modern text-to-speech (TTS) and voice conversion (VC) systems produce natural sounding
speech that questions the security of automatic speaker verification (ASV). This makes …

Synthetic speech detection through short-term and long-term prediction traces

C Borrelli, P Bestagini, F Antonacci, A Sarti… - EURASIP Journal on …, 2021 - Springer
Several methods for synthetic audio speech generation have been developed in the
literature through the years. With the great technological advances brought by deep …

Speech is silver, silence is golden: What do ASVspoof-trained models really learn?

NM Müller, F Dieckmann, P Czempin, R Canals… - arXiv preprint arXiv …, 2021 - arxiv.org
We present our analysis of a significant data artifact in the official 2019/2021 ASVspoof
Challenge Dataset. We identify an uneven distribution of silence duration in the training and …

Long range acoustic and deep features perspective on ASVspoof 2019

RK Das, J Yang, H Li - 2019 IEEE Automatic Speech …, 2019 - ieeexplore.ieee.org
To secure automatic speaker verification (ASV) systems from intruders, robust
countermeasures for spoofing attack detection are required. The ASVspoof series of …

[PDF][PDF] Pindrop labs' submission to the ASVspoof 2021 challenge

T Chen, E Khoury, K Phatak… - Proc. 2021 Edition of the …, 2021 - isca-archive.org
Voice spoofing has become a great threat to automatic speaker verification (ASV) systems
due to the rapid development of the speech synthesis and voice conversion techniques …

[PDF][PDF] Long Range Acoustic Features for Spoofed Speech Detection.

RK Das, J Yang, H Li - Interspeech, 2019 - isca-archive.org
Speaker verification systems in practice are vulnerable to spoofing attacks. The high quality
recording and playback devices make replay attack a real threat to speaker verification …

Assessing the scope of generalized countermeasures for anti-spoofing

RK Das, J Yang, H Li - ICASSP 2020-2020 IEEE International …, 2020 - ieeexplore.ieee.org
Most of the research on anti-spoofing countermeasures are specific to a type of spoofing
attacks, where models are trained on data of a particular nature, either synthetic or replay …