The ASVSpoof challenges goal is to evaluate countermeasures to spoof attacks on automatic speaker verification systems. We first analyze in more details the results of the baseline systems provided by the organization and unveil several weaknesses for some types of attack. In particular for the physical access (PA) task, replay attacks with low reverberation time and/or high quality of the replay device are problematic. Based on this observation, we propose several improvements. Firstly, a specific learning targeting the problematic types of attack. Secondly, a new type of feature enhancing the reverberation. Thirdly, a Deep Neural Network with more modelling capability. On the development set of the PA task, each proposed improvements show...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceAutomatic speaker verification (ASV) is one of the most natural and convenient...
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use t...
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especial...
International audienceASVspoof 2021 is the forth edition in the series of biannual challenges which ...
International audienceASVspoof, now in its third edition, is a series of community-led challenges wh...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceThe now-acknowledged vulnerabilities of automatic speaker verification (ASV) t...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
This is a database used for the Third Automatic Speaker Verification Spoofing and Countermeasures Ch...
PhD ThesisVoice biometric systems use automatic speaker veri cation (ASV) technology for user authe...
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also cal...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceAutomatic speaker verification (ASV) is one of the most natural and convenient...
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use t...
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especial...
International audienceASVspoof 2021 is the forth edition in the series of biannual challenges which ...
International audienceASVspoof, now in its third edition, is a series of community-led challenges wh...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceThe now-acknowledged vulnerabilities of automatic speaker verification (ASV) t...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
This is a database used for the Third Automatic Speaker Verification Spoofing and Countermeasures Ch...
PhD ThesisVoice biometric systems use automatic speaker veri cation (ASV) technology for user authe...
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also cal...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
International audienceAutomatic speaker verification (ASV) is one of the most natural and convenient...
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use t...