Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also called spoofing attacks. Replay is among the simplest attacks to mount - yet difficult to detect reliably. The generalization failure of spoofing countermeasures (CMs) has driven the community to study various alternative deep learning CMs. The majority of them are supervised approaches that learn a human-spoof discriminator. In this paper, we advocate a different, deep generative approach that leverages from powerful unsupervised manifold learning in classification. The potential benefits include the possibility to sample new data, and to obtain insights to the latent features of genuine and spoofed speech. To this end, we propose to use variat...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
Automatic speaker verification (ASV) systems play a prominent role in the security field due to the ...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
PhD ThesisVoice biometric systems use automatic speaker veri cation (ASV) technology for user authe...
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especial...
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use t...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
The ASVSpoof challenges goal is to evaluate countermeasures to spoof attacks on automatic speaker ve...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
Automatic speaker verification (ASV) systems play a prominent role in the security field due to the ...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
PhD ThesisVoice biometric systems use automatic speaker veri cation (ASV) technology for user authe...
Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especial...
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use t...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
Current state-of-the-art automatic speaker verification (ASV) systems are prone to spoofing. The sec...
The ASVSpoof challenges goal is to evaluate countermeasures to spoof attacks on automatic speaker ve...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Subject of Research. The present work considers the problem of detecting replay attacks on voice bio...
In our everyday lives, we communicate with each other using several means and channels of communicat...
In our everyday lives, we communicate with each other using several means and channels of communicat...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
Playing recorded speech samples of an enrolled speaker - "replay attack" - is a simple approach to b...
Automatic speaker verification (ASV) systems play a prominent role in the security field due to the ...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...