A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Introduction to voice presentation attack detection and recent advances

M Sahidullah, H Delgado, M Todisco, A Nautsch… - Handbook of Biometric …, 2023 - Springer
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …

The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection

T Kinnunen, M Sahidullah, H Delgado… - Interspeech …, 2017 - research.ed.ac.uk
The ASVspoof initiative was created to promote the development of countermeasures which
aim to protect automatic speaker verification (ASV) from spoofing attacks. The first …

ASVspoof: the automatic speaker verification spoofing and countermeasures challenge

Z Wu, J Yamagishi, T Kinnunen… - IEEE Journal of …, 2017 - ieeexplore.ieee.org
Concerns regarding the vulnerability of automatic speaker verification (ASV) technology
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …

Who is real bob? adversarial attacks on speaker recognition systems

G Chen, S Chenb, L Fan, X Du, Z Zhao… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or
identification mechanism. The popularity of SR brings in serious security concerns, as …

Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication

L Zhang, S Tan, J Yang - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Voice biometrics is drawing increasing attention as it is a promising alternative to legacy
passwords for mobile authentication. Recently, a growing body of work shows that voice …

[PDF][PDF] Audio Replay Attack Detection Using High-Frequency Features.

M Witkowski, S Kacprzak, P Zelasko, K Kowalczyk… - Interspeech, 2017 - researchgate.net
This paper presents our contribution to the ASVspoof 2017 Challenge. It addresses a replay
spoofing attack against a speaker recognition system by detecting that the analysed signal …

ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements

H Delgado, M Todisco, M Sahidullah… - The Speaker and …, 2018 - research.ed.ac.uk
The now-acknowledged vulnerabilities of automatic speaker verification (ASV) technology to
spoofing attacks have spawned interests to develop so-called spoofing countermeasures …

Advances in anti-spoofing: from the perspective of ASVspoof challenges

MR Kamble, HB Sailor, HA Patil, H Li - APSIPA Transactions on …, 2020 - cambridge.org
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …

Adversarial attacks on GMM i-vector based speaker verification systems

X Li, J Zhong, X Wu, J Yu, X Liu… - ICASSP 2020-2020 …, 2020 - ieeexplore.ieee.org
This work investigates the vulnerability of Gaussian Mixture Model (GMM) i-vector based
speaker verification systems to adversarial attacks, and the transferability of adversarial …