6 pages6 pages6 pagesThe second Automatic Speaker Verification Spoofing and Countermeasures challenge (ASVspoof 2017) focused on "replay attack" detection. The best deep-learning systems to compete in ASVspoof 2017 used Convolutional Neural Networks (CNNs) as a feature extractor. In this paper, we study their performance in an end-to-end setting. We find that these architectures show poor generalization in the evaluation dataset, but find a compact architecture that shows good generalization on the development data. We demonstrate that for this dataset it is not easy to obtain a similar level of generalization on both the development and evaluation data. This leads to a variety of open questions about what the differences are in the data; w...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especial...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
With the increasing use of voice as a biometric, it has become imperative to develop countermeasures...
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also cal...
Spectrograms - time-frequency representations of audio signals - have found widespread use in neural...
Biometric security systems based on predefined speech sentences are extremely common nowadays, parti...
In our everyday lives, we communicate with each other using several means and channels of communicat...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
In our everyday lives, we communicate with each other using several means and channels of communicat...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especial...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
With the increasing use of voice as a biometric, it has become imperative to develop countermeasures...
Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also cal...
Spectrograms - time-frequency representations of audio signals - have found widespread use in neural...
Biometric security systems based on predefined speech sentences are extremely common nowadays, parti...
In our everyday lives, we communicate with each other using several means and channels of communicat...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
In our everyday lives, we communicate with each other using several means and channels of communicat...
8 pages, accepted by Odyssey 2022International audienceDeep learning has brought impressive progress...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especial...