ASSERT: Anti-spoofing with squeeze-excitation and residual networks

CI Lai, N Chen, J Villalba, N Dehak - arXiv preprint arXiv:1904.01120, 2019 - arxiv.org
We present JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …

Channel-wise gated res2net: Towards robust detection of synthetic speech attacks

X Li, X Wu, H Lu, X Liu, H Meng - arXiv preprint arXiv:2107.08803, 2021 - arxiv.org
Existing approaches for anti-spoofing in automatic speaker verification (ASV) still lack
generalizability to unseen attacks. The Res2Net approach designs a residual-like …

A Comprehensive Review of DeepFake Detection Using Advanced Machine Learning and Fusion Methods

G Gupta, K Raja, M Gupta, T Jan, ST Whiteside… - Electronics, 2023 - mdpi.com
Recent advances in Generative Artificial Intelligence (AI) have increased the possibility of
generating hyper-realistic DeepFake videos or images to cause serious harm to vulnerable …

[HTML][HTML] A robust voice spoofing detection system using novel CLS-LBP features and LSTM

H Dawood, S Saleem, F Hassan, A Javed - Journal of King Saud University …, 2022 - Elsevier
Abstract Automatic Speaker Verification (ASV) systems are vulnerable to a variety of voice
spoofing attacks, eg, replays, speech synthesis, etc. The imposters/fraudsters often use …

Comparative analysis of asv spoofing countermeasures: Evaluating res2net-based approaches

M Yang, K Zheng, X Wang, Y Sun… - IEEE Signal Processing …, 2023 - ieeexplore.ieee.org
Popular topics in the field of countermeasures include feature engineering and neural-
network-based models, which involve neural network architectures and loss criteria. This …

Texture analysis of edge mapped audio spectrogram for spoofing attack detection

F Meriem, B Messaoud, Y Bahia - Multimedia Tools and Applications, 2024 - Springer
The vulnerability of the Automatic Speaker verification technology to different presentation
attacks has drawn much interest to design anti-spoofing countermeasures. Following their …

Speech replay detection with x-vector attack embeddings and spectral features

J Williams, J Rownicka - arXiv preprint arXiv:1909.10324, 2019 - arxiv.org
We present our system submission to the ASVspoof 2019 Challenge Physical Access (PA)
task. The objective for this challenge was to develop a countermeasure that identifies …

Replay attack detection using linear prediction analysis-based relative phase features

K Phapatanaburi, L Wang, S Nakagawa… - IEEE …, 2019 - ieeexplore.ieee.org
Recent studies have reported the success of linear prediction analysis (LPA)-related
features, which are extracted as a short-term spectral feature for replay attack detection due …

Linear prediction residual-based constant-Q cepstral coefficients for replay attack detection

K Phapatanaburi, P Buayai, M Kupimai… - 2020 8th International …, 2020 - ieeexplore.ieee.org
This paper proposes a new linear prediction residual-based constant-Q cepstral coefficients
(LPR-CQCC) feature for replay attack detection (RAD). The main contribution of the …

Replay attack detection using variable-frequency resolution phase and magnitude features

M Liu, L Wang, J Dang, KA Lee, S Nakagawa - Computer Speech & …, 2021 - Elsevier
Replay attacks pose the most severe threat to automatic speaker verification systems among
various spoofing attacks. In this paper, we propose a novel feature extraction method that …