Due to copyright restrictions, the access to the full text of this article is only available via subscription.In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, while an unknown attacker is a spoofing system whose output was not available to the countermeasur...
This paper presents the first version of a speaker verification spoof-ing and anti-spoofing database...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
The potential for biometric systems to be manipulated through some form of subversion is well acknow...
While biometric authentication has advanced significantly in recent years, evidence shows the techno...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as impo...
Abstract Progress in the development of spoofing countermeasures for automatic speaker recognition i...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Any biometric recognizer is vulnerable to direct spoofing at-tacks and automatic speaker verificatio...
Even though improvements in the speaker verification (SV) technology with i-vectors increased their ...
The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in prot...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
The ability to employ automatic speaker verification systems without face-to-face contact makes them...
Submitted to IberSPEECH 2022 ConferenceThe spoofing-aware speaker verification (SASV) challenge was ...
This paper presents the first version of a speaker verification spoof-ing and anti-spoofing database...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
The potential for biometric systems to be manipulated through some form of subversion is well acknow...
While biometric authentication has advanced significantly in recent years, evidence shows the techno...
A speaker verification system automatically accepts or rejects a claimed identity of a speaker based...
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as impo...
Abstract Progress in the development of spoofing countermeasures for automatic speaker recognition i...
Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric pe...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
Any biometric recognizer is vulnerable to direct spoofing at-tacks and automatic speaker verificatio...
Even though improvements in the speaker verification (SV) technology with i-vectors increased their ...
The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in prot...
International audienceIn this paper, we initiate the concern of enhancing the spoofing robustness of...
The ability to employ automatic speaker verification systems without face-to-face contact makes them...
Submitted to IberSPEECH 2022 ConferenceThe spoofing-aware speaker verification (SASV) challenge was ...
This paper presents the first version of a speaker verification spoof-ing and anti-spoofing database...
International audienceThe ASVspoof initiative was conceived to spearhead research in anti-spoofing f...
The potential for biometric systems to be manipulated through some form of subversion is well acknow...