International audienceAutomatic speaker verification is susceptible to various manipulations and spoofing, such as text-to-speech synthesis, voice conversion, replay, tampering, adversarial attacks, and so on. We consider a new spoofing scenario called “Partial Spoof” (PS) in which synthesized or transformed speech segments are embedded into a bona fide utterance. While existing countermeasures (CMs) can detect fully spoofed utterances, there is a need for their adaptation or extension to the PS scenario. We propose various improvements to construct a significantly more accurate CM that can detect and locate short-generated spoofed speech segments at finer temporal resolutions. First, we introduce newly developed self-supervised pre-trained...
The performance of a speaker verification system is severely degraded by spoofing attacks generated ...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
All existing databases of spoofed speech contain attack data that is spoofed in its entirety. In pra...
The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in prot...
Anti spoofing techniques to mitigate spoofing threats in automatic speaker verification has gained m...
Speech consists of voiced and unvoiced segments that differ in their production process and exhibit ...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
Spoofing detection systems for automatic speaker verification have moved from only modelling voiced ...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Even though improvements in the speaker verification (SV) technology with i-vectors increased their ...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
International audienceIn this paper, we introduce a frame selection strategy for improved detection ...
This is the pretrained model for our paper (doi: 10.1109/TASLP.2022.3233236): @ARTICLE{zhang2022Par...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
The performance of a speaker verification system is severely degraded by spoofing attacks generated ...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
All existing databases of spoofed speech contain attack data that is spoofed in its entirety. In pra...
The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in prot...
Anti spoofing techniques to mitigate spoofing threats in automatic speaker verification has gained m...
Speech consists of voiced and unvoiced segments that differ in their production process and exhibit ...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
Spoofing detection systems for automatic speaker verification have moved from only modelling voiced ...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Even though improvements in the speaker verification (SV) technology with i-vectors increased their ...
The objective of this paper is to extract robust features for detecting replay spoof attacks on text...
International audienceIn this paper, we introduce a frame selection strategy for improved detection ...
This is the pretrained model for our paper (doi: 10.1109/TASLP.2022.3233236): @ARTICLE{zhang2022Par...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
The performance of a speaker verification system is severely degraded by spoofing attacks generated ...
In our everyday lives, we communicate with each other using several means and channels of communicat...
Due to copyright restrictions, the access to the full text of this article is only available via sub...