The Speaker and Language Recognition Workshop (Odyssey 2020) 2020
DOI: 10.21437/odyssey.2020-19
|View full text |Cite
|
Sign up to set email alerts
|

Generalization of Audio Deepfake Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
69
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 124 publications
(71 citation statements)
references
References 7 publications
1
69
0
1
Order By: Relevance
“…A summary of existing approaches can be found in the recent ASVspoof challenges [3,4]. While some of the methods from this field, such as those in [5,6,7], may be applicable to the problem at hand, they typically address a different class of voice modification such as voice conversion or voice synthesis aiming at triggering a false positive voice verification. A key difference with these works, and with other ASV spoof approaches, is the common assumption that speech samples, or features of speech samples, from the original speaker are available; which is not the case for our problem.…”
Section: Relation To Prior Workmentioning
confidence: 99%
“…A summary of existing approaches can be found in the recent ASVspoof challenges [3,4]. While some of the methods from this field, such as those in [5,6,7], may be applicable to the problem at hand, they typically address a different class of voice modification such as voice conversion or voice synthesis aiming at triggering a false positive voice verification. A key difference with these works, and with other ASV spoof approaches, is the common assumption that speech samples, or features of speech samples, from the original speaker are available; which is not the case for our problem.…”
Section: Relation To Prior Workmentioning
confidence: 99%
“…Led by the ASVspoof initiative and corresponding challenge series, countermeasure (CM) systems have hence been developed in order to help detect and deflect spoofing attacks [8][9][10]. In the case of a logical access, telephony scenario involving only TTS and VC attacks, the best performing spoofing CM systems can deliver EERs of less than 2% [11][12][13][14][15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…Hence, tackling these attacks through means of efficient features and machine learning algorithms are a desideratum. The studies in anti-spoofing or countermeasures have increased tremendously with increasing attacks on main-frame systems such as phone-banking theft, unauthentic access to workplaces or even smart phone devices where speech is used as the identity [3], [4]. So, as authentication is no more limited to finger prints and retina scans, the speech based spoofing attacks are growing and catching attention of many researchers for developing robust spoofing detection schemes.…”
Section: Introductionmentioning
confidence: 99%