Subject of Research. The present work considers the problem of detecting replay attacks on voice biometric systems. Due to their simplicity, these attacks are more likely to be used by the imposters, and that is why they are of special risk. This work describes the system for detecting replay attacks that was presented on the Automatic Speaker Verification Spoofing and Countermeasures (ASVspoof) Challenge 2017 focused on this problem.Method. We study the efficiency of deep learning approach in the described task, in particular, convolutional neural networks with Max-Feature-Map activation function. Main Results. Experimental results obtained on the Challenge corpora have demonstrated high performance of such approach in contrast to current...
Part 9: Pattern RecognitionInternational audienceWith the development of speech technology, various ...
Replay attack refers to the use of recorded speech in an attempt to spoof an automatic speaker verif...
Automatic speaker verification (ASV) systems play a prominent role in the security field due to the ...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Biometric security systems based on predefined speech sentences are extremely common nowadays, parti...
6 pages6 pages6 pagesThe second Automatic Speaker Verification Spoofing and Countermeasures challeng...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
PhD ThesisVoice biometric systems use automatic speaker veri cation (ASV) technology for user authe...
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also cal...
Part 9: Pattern RecognitionInternational audienceWith the development of speech technology, various ...
Replay attack refers to the use of recorded speech in an attempt to spoof an automatic speaker verif...
Automatic speaker verification (ASV) systems play a prominent role in the security field due to the ...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Biometric security systems based on predefined speech sentences are extremely common nowadays, parti...
6 pages6 pages6 pagesThe second Automatic Speaker Verification Spoofing and Countermeasures challeng...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
PhD ThesisVoice biometric systems use automatic speaker veri cation (ASV) technology for user authe...
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also cal...
Part 9: Pattern RecognitionInternational audienceWith the development of speech technology, various ...
Replay attack refers to the use of recorded speech in an attempt to spoof an automatic speaker verif...
Automatic speaker verification (ASV) systems play a prominent role in the security field due to the ...