Audio-replay attack detection countermeasures

05/24/2017
by   Galina Lavrentyeva, et al.
0

This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017. In this study we focused on comparison of different spoofing detection approaches. These were GMM based methods, high level features extraction with simple classifier and deep learning frameworks. Experiments performed on the development and evaluation parts of the challenge dataset demonstrated stable efficiency of deep learning approaches in case of changing acoustic conditions. At the same time SVM classifier with high level features provided a substantial input in the efficiency of the resulting STC systems according to the fusion systems results.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/29/2015

STC Anti-spoofing Systems for the ASVspoof 2015 Challenge

This paper presents the Speech Technology Center (STC) systems submitted...
research
04/11/2019

STC Antispoofing Systems for the ASVspoof2019 Challenge

This paper describes the Speech Technology Center (STC) antispoofing sys...
research
08/29/2018

Replay spoofing detection system for automatic speaker verification using multi-task learning of noise classes

In this paper, we propose a replay attack spoofing detection system for ...
research
05/22/2018

A Study On Convolutional Neural Network Based End-To-End Replay Anti-Spoofing

The second Automatic Speaker Verification Spoofing and Countermeasures c...
research
10/31/2018

Attentive Filtering Networks for Audio Replay Attack Detection

An attacker may use a variety of techniques to fool an automatic speaker...
research
01/31/2020

A study on the role of subsidiary information in replay attack spoofing detection

In this study, we analyze the role of various categories of subsidiary i...
research
10/10/2016

Investigation of Synthetic Speech Detection Using Frame- and Segment-Specific Importance Weighting

Speaker verification systems are vulnerable to spoofing attacks which pr...

Please sign up or login with your details

Forgot password? Click here to reset