A Practical Guide to Logical Access Voice Presentation Attack Detection

01/10/2022
by   Xin Wang, et al.
0

Voice-based human-machine interfaces with an automatic speaker verification (ASV) component are commonly used in the market. However, the threat from presentation attacks is also growing since attackers can use recent speech synthesis technology to produce a natural-sounding voice of a victim. Presentation attack detection (PAD) for ASV, or speech anti-spoofing, is therefore indispensable. Research on voice PAD has seen significant progress since the early 2010s, including the advancement in PAD models, benchmark datasets, and evaluation campaigns. This chapter presents a practical guide to the field of voice PAD, with a focus on logical access attacks using text-to-speech and voice conversion algorithms and spoofing countermeasures based on artifact detection. It introduces the basic concept of voice PAD, explains the common techniques, and provides an experimental study using recent methods on a benchmark dataset. Code for the experiments is open-sourced.

READ FULL TEXT

page 28

page 29

page 31

research
10/27/2020

One-class learning towards generalized voice spoofing detection

Human voices can be used to authenticate the identity of the speaker, bu...
research
01/04/2019

Introduction to Voice Presentation Attack Detection and Recent Advances

Over the past few years significant progress has been made in the field ...
research
07/30/2021

Practical Attacks on Voice Spoofing Countermeasures

Voice authentication has become an integral part in security-critical op...
research
07/21/2021

A Tandem Framework Balancing Privacy and Security for Voice User Interfaces

Speech synthesis, voice cloning, and voice conversion techniques present...
research
06/27/2021

AI based Presentation Creator With Customized Audio Content Delivery

In this paper, we propose an architecture to solve a novel problem state...
research
10/06/2022

PSVRF: Learning to restore Pitch-Shifted Voice without reference

Pitch scaling algorithms have a significant impact on the security of Au...
research
09/19/2023

Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks

Automatic Speaker Verification (ASV) systems are increasingly used in vo...

Please sign up or login with your details

Forgot password? Click here to reset