2015
DOI: 10.1109/tifs.2015.2398812
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Universal Synthetic Speech Spoofing Detection Using Phase Information

Abstract: In the field of speaker verification (SV) it is nowadays feasible and relatively easy to create a synthetic voice to deceive a speech driven biometric access system. This paper presents a synthetic speech detector that can be connected at the front-end or at the back-end of a standard SV system, and that will protect it from spoofing attacks coming from stateof-the-art statistical Text to Speech (TTS) systems. The system described is a Gaussian Mixture Model (GMM) based binary classifier that uses natural and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
41
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 77 publications
(41 citation statements)
references
References 32 publications
0
41
0
Order By: Relevance
“…Considering the phase information is usually neglected by many synthetic techniques, phase-based features are typically used for anti-spoofing, such as modified group delay (MGD) [6,7,8,9], cosine-normalized phase [6,9], relative phase shift (RPS) [10,11,12,13], cochlear filter cepstral coefficients plus instantaneous frequency (CFCCIF) [14]. Modulation-base features have been used in [15] to detect temporal artifacts.…”
Section: Introductionmentioning
confidence: 99%
“…Considering the phase information is usually neglected by many synthetic techniques, phase-based features are typically used for anti-spoofing, such as modified group delay (MGD) [6,7,8,9], cosine-normalized phase [6,9], relative phase shift (RPS) [10,11,12,13], cochlear filter cepstral coefficients plus instantaneous frequency (CFCCIF) [14]. Modulation-base features have been used in [15] to detect temporal artifacts.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, with the improvement of automatic speech generation methods, speech produced by voice conversion (VC) [2] [3] and speech synthesis (SS) [4] [5] techniques has been used to attack ASV systems. Over the past few years, much research has been devoted to protect ASV systems against spoofing attack [6][7] [8].…”
Section: Introductionmentioning
confidence: 99%
“…The methods to detect such attacks, whether generated by voice conversion or speech synthesis algorithms, have mainly focused on the use of features such as the signal phase [8], [9], cepstral coefficients [10]- [12], pitch patterns [13], [14] or the longterm modulation spectrum [15]. There are also approaches that are based on the detection of "pop noise" [16].…”
Section: Introductionmentioning
confidence: 99%