Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks

09/19/2023
by   Awais Khan, et al.
0

Automatic Speaker Verification (ASV) systems are increasingly used in voice bio-metrics for user authentication but are susceptible to logical and physical spoofing attacks, posing security risks. Existing research mainly tackles logical or physical attacks separately, leading to a gap in unified spoofing detection. Moreover, when existing systems attempt to handle both types of attacks, they often exhibit significant disparities in the Equal Error Rate (EER). To bridge this gap, we present a Parallel Stacked Aggregation Network that processes raw audio. Our approach employs a split-transform-aggregation technique, dividing utterances into convolved representations, applying transformations, and aggregating the results to identify logical (LA) and physical (PA) spoofing attacks. Evaluation of the ASVspoof-2019 and VSDC datasets shows the effectiveness of the proposed system. It outperforms state-of-the-art solutions, displaying reduced EER disparities and superior performance in detecting spoofing attacks. This highlights the proposed method's generalizability and superiority. In a world increasingly reliant on voice-based security, our unified spoofing detection system provides a robust defense against a spectrum of voice spoofing attacks, safeguarding ASVs and user data effectively.

READ FULL TEXT

page 1

page 5

page 7

page 9

page 10

research
09/23/2022

Synthetic Voice Spoofing Detection Based On Online Hard Example Mining

The automatic speaker verification spoofing (ASVspoof) challenge series ...
research
10/02/2022

Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward

Malicious actors may seek to use different voice-spoofing attacks to foo...
research
11/16/2018

Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

Over the last few years, a rapidly increasing number of Internet-of-Thin...
research
01/10/2022

A Practical Guide to Logical Access Voice Presentation Attack Detection

Voice-based human-machine interfaces with an automatic speaker verificat...
research
02/28/2022

Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations

Despite several years of research in deepfake and spoofing detection for...
research
09/18/2023

Frame-to-Utterance Convergence: A Spectra-Temporal Approach for Unified Spoofing Detection

Voice spoofing attacks pose a significant threat to automated speaker ve...

Please sign up or login with your details

Forgot password? Click here to reset