2015
DOI: 10.1016/j.specom.2014.10.005
|View full text |Cite
|
Sign up to set email alerts
|

Spoofing and countermeasures for speaker verification: A survey

Abstract: While biometric authentication has advanced significantly in recent years, evidence shows the technology can be susceptible to malicious spoofing attacks. The research community has responded with dedicated countermeasures which aim to detect and deflect such attacks. Even if the literature shows that they can be effective, the problem is far from being solved; biometric systems remain vulnerable to spoofing. Despite a growing momentum to develop spoofing countermeasures for automatic speaker verification, now… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
355
0
2

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 553 publications
(357 citation statements)
references
References 138 publications
0
355
0
2
Order By: Relevance
“…for fingerprint recognition [3], face recognition [4] and speaker recognition [5]. The intention is also to stimulate further work, particularly the development of standard metrics, protocols and datasets for evaluating progress.…”
Section: Introductionmentioning
confidence: 99%
“…for fingerprint recognition [3], face recognition [4] and speaker recognition [5]. The intention is also to stimulate further work, particularly the development of standard metrics, protocols and datasets for evaluating progress.…”
Section: Introductionmentioning
confidence: 99%
“…A survey by Wu et al [7] provides a comprehensive overview of both the existing spoofing attacks and the available attack detection approaches. An overview of the methods for synthetic speech detection by Sahidullah et al [15] benchmarks several existing feature extraction methods and classifiers on ASVspoof database.…”
Section: Featuresmentioning
confidence: 99%
“…Therefore, developing mechanisms for detection of presentation attacks is gaining interest in the speech community [7]. In that regard, the emphasis until now has been on logical access attacks, largely thanks to the "Automatic Speaker Verification Spoofing and Countermeasures Challenge" [4], which provided a large benchmark corpus containing voice conversion-based and speech synthesis-based attacks.…”
Section: Introductionmentioning
confidence: 99%
“…3;2015 prompted to pronounce random words offered instantly by the system. However, the free choice of spoken sentences is allowed in text-independent voice authentication systems (Bellegarda & Silverman, 2014;Z. Wu et al, 2015).…”
Section: Voice Featuresmentioning
confidence: 99%