Voice spoofing detector: A unified anti-spoofing framework

نویسندگان

چکیده

Voice controlled systems (VCS) in Internet of Things (IoT), speaker verification systems, voice-based biometrics, and other voice-assistant-enabled are vulnerable to different spoofing attacks i.e., replay, cloning, cloned-replay, etc. VCS not only susceptible these a non-network environment, but they also multi-order networked IoT. Additionally, deepfakes with artificially generated audio pose great threat the all having voice-interfaces. Most existing countermeasures against voice work for one specific attack (e.g. replay) fail generalize this classes attacks. generalization is crucial cross-corpora evaluation. Thus, there exists need develop unified anti-spoofing framework capable detecting multiple This presents that uses novel (ATCoP-GTCC) features combat variety The proposed acoustic-ternary co-occurrence patterns (ATCoP) encode similar between center neighboring samples. Our experiments demonstrate ATCoP can better capture microphone induced distortions replays, unnatural prosody algorithmic artifacts cloned samples, both cloned-replays including compression on multi-hop performance could be further enhanced by Gammatone cepstral coefficients. To evaluate effectiveness system replay cloned-replay detection, we created diverse detection corpus (VSDC) containing audios bonafide recordings, respectively. Experimental results obtained VSDC, ASVspoof 2019, Google’s LJ Speech, YouTube datasets illustrate terms accurate • Novel feature descriptor presentation detection. Unified method detect single- Accurate compressed uncompressed audios. performs remarkably well

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anti-spoofing, Voice Databases

As with any task involving statistical pattern recognition, the assessment of spoofing and anti-spoofing approaches for voice recognition calls for significantscale databases of spoofed speech signals. Depending on the application, these signals should normally reflect spoofing attacks performed prior to acquisition at the sensor or microphone. Since the collection of large quantities of any bi...

متن کامل

Anti-spoofing, Voice

The process of verifying whether the voice sample presented to an authentication system is real (i.e., alive), or whether it is replayed or synthetic, and thus fraudulent. When authentication through a voice authentication system is requested, it is important to be sure that the person seeking the authentication actually provides the required voice sample at the time and place of the authentica...

متن کامل

Anti-spoofing, Voice Conversion

Voice conversion is a process which converts or transforms one speaker’s voice towards that of another. The literature shows that voice conversion can be used to spoof or fool an automatic speaker verification system. State-of-the-art voice conversion algorithms can produce high-quality speech signals in real time and are capable of fooling both human listeners and automatic systems, including ...

متن کامل

Speaker Recognition Anti-spoofing

Progress in the development of spoofing countermeasures for automatic speaker recognition is less advanced than equivalent work related to other biometric modalities. This chapter outlines the potential for even state-of-the-art automatic speaker recognition systems to be spoofed. While the use of a multitude of different datasets, protocols and metrics complicates the meaningful comparison of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Expert Systems With Applications

سال: 2022

ISSN: ['1873-6793', '0957-4174']

DOI: https://doi.org/10.1016/j.eswa.2022.116770