Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, (ii) be well-generalized for practical attacks, and (iii) be simple and efficient. Several audio-based spoofing detection methods have been proposed recently but their evaluation is limited to less realistic databases containing homogeneous data. In this paper, we consider eight existing presentation attack detection (PAD) methods and evaluate their performance using two major publicly available speaker databases with spoofing attacks: AVspoof and ASVspoof. We first show that realistic pre...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceASVspoof, now in its third edition, is a series of community-led challenges wh...
This is a database used for the Third Automatic Speaker Verification Spoofing and Countermeasures Ch...
Despite an increasing interest in speaker recognition technologies, a significant obstacle still hin...
In recent years, there has been a growing interest in developing countermeasures against non zero-ef...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
International audienceAutomatic speaker verification (ASV) is one of the most natural and convenient...
International audienceThe vulnerability of automatic speaker verification (ASV) systems to spoofing ...
International audienceOver the past few years significant progress has been made in the field of pre...
The emergence of biometric technology provides enhanced security compared to the traditional identif...
AbstractThe emergence of biometric technology provides enhanced security compared to the traditional...
The emergence of biometric technology provides enhanced security compared to the traditional identif...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use t...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceASVspoof, now in its third edition, is a series of community-led challenges wh...
This is a database used for the Third Automatic Speaker Verification Spoofing and Countermeasures Ch...
Despite an increasing interest in speaker recognition technologies, a significant obstacle still hin...
In recent years, there has been a growing interest in developing countermeasures against non zero-ef...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
International audienceAutomatic speaker verification (ASV) is one of the most natural and convenient...
International audienceThe vulnerability of automatic speaker verification (ASV) systems to spoofing ...
International audienceOver the past few years significant progress has been made in the field of pre...
The emergence of biometric technology provides enhanced security compared to the traditional identif...
AbstractThe emergence of biometric technology provides enhanced security compared to the traditional...
The emergence of biometric technology provides enhanced security compared to the traditional identif...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use t...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceASVspoof, now in its third edition, is a series of community-led challenges wh...
This is a database used for the Third Automatic Speaker Verification Spoofing and Countermeasures Ch...