Multi-task Learning-Based Spoofing-Robust Automatic Speaker Verification System
نویسندگان
چکیده
Abstract Spoofing attacks posed by generating artificial speech can severely degrade the performance of a speaker verification system. Recently, many anti-spoofing countermeasures have been proposed for detecting varying types from synthetic to replay presentations. While there are numerous effective defenses reported on standalone solutions, integration and spoofing detection systems has obvious benefits. In this paper, we propose spoofing-robust automatic system diverse based multi-task learning architecture. This deep learning-based model is jointly trained with time-frequency representations utterances provide recognition decisions both tasks simultaneously. Compared other state-of-the-art ASVspoof 2017 2019 corpora, substantial improvement combined under different conditions be obtained.
منابع مشابه
Spoofing and countermeasures for automatic speaker verification
It is widely acknowledged that most biometric systems are vulnerable to spoofing, also known as imposture. While vulnerabilities and countermeasures for other biometric modalities have been widely studied, e.g. face verification, speaker verification systems remain vulnerable. This paper describes some specific vulnerabilities studied in the literature and presents a brief survey of recent work...
متن کاملAnti-spoofing Methods for Automatic Speaker Verification System
Growing interest in automatic speaker verification (ASV) systems has lead to significant quality improvement of spoofing attacks on them. Many research works confirm that despite the low equal error rate (EER) ASV systems are still vulnerable to spoofing attacks. In this work we overview different acoustic feature spaces and classifiers to determine reliable and robust countermeasures against s...
متن کاملFeature Selection Based on CQCCs for Automatic Speaker Verification Spoofing
The ASVspoof 2017 challenge aims to assess spoofing and countermeasures attack detection accuracy for automatic speaker verification. It has been proven that constant Q cepstral coefficients(CQCCs) processes speech in different frequencies with variable resolution and performs much better than traditional features. When coupled with a Gaussian mixture model (GMM), it is an excellently effective...
متن کاملMulti-task learning for text-dependent speaker verification
Text-dependent speaker verification uses short utterances and verifies both speaker identity and text contents. Due to this nature, traditional state-of-the-art speaker verification approaches, such as i-vector, may not work well. Recently, there has been interest of applying deep learning to speaker verification, however in previous works, standalone deep learning systems have not achieved sta...
متن کاملDevelopment of CRIM system for the automatic speaker verification spoofing and countermeasures challenge 2015
The automatic speaker verification spoofing and countermeasures challenge 2015 provides a common framework for the evaluation of spoofing countermeasures or anti-spoofing techniques in the presence of various seen and unseen spoofing attacks. This contribution proposes a system consisting of amplitude, phase, linear prediction residual, and combined amplitude phase-based countermeasures for the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Circuits Systems and Signal Processing
سال: 2022
ISSN: ['0278-081X', '1531-5878']
DOI: https://doi.org/10.1007/s00034-022-01974-z