CONF
Korshunov_INTERSPEECH_2016/IDIAP
Cross-database evaluation of audio-based spoofing detection systems
Korshunov, Pavel
Marcel, Sébastien
cross-database testing
Open Source
presentation attack
speaker anti-spoofing
EXTERNAL
https://publications.idiap.ch/attachments/papers/2016/Korshunov_INTERSPEECH_2016.pdf
PUBLIC
https://publications.idiap.ch/index.php/publications/showcite/Korshunov_Idiap-RR-23-2016
Related documents
Interspeech
San Francisco, USA
2016
https://pypi.python.org/pypi/bob.paper.interspeech_2016
URL
Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, (ii) be well-generalized for practical attacks, and (iii) be simple and efficient. Several audio-based spoofing detection methods have been proposed recently but their evaluation is limited to less realistic databases containing homogeneous data. In this paper, we consider eight existing presentation attack detection (PAD) methods and evaluate their performance using two major publicly available speaker databases with spoofing attacks: AVspoof and ASVspoof. We first show that realistic presentation attacks (speech is replayed to PAD system) are significantly more challenging for the considered PAD methods compared to the so called `logical access' attacks (speech is presented to PAD system directly). Then, via a cross-database evaluation, we demonstrate that the existing methods generalize poorly when different databases or different types of attacks are used for training and testing. The results question the efficiency and practicality of the existing PAD systems, as well as, call for creation of databases with larger variety of realistic speech presentation attacks.
REPORT
Korshunov_Idiap-RR-23-2016/IDIAP
Cross-database evaluation of audio-based spoofing detection systems
Korshunov, Pavel
Marcel, Sébastien
EXTERNAL
https://publications.idiap.ch/attachments/reports/2016/Korshunov_Idiap-RR-23-2016.pdf
PUBLIC
Idiap-RR-23-2016
2016
Idiap
October 2016
Open source software package for the paper: https://pypi.python.org/pypi/bob.paper.interspeech_2016
Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, (ii) be well-generalized for practical attacks, and (iii) be simple and efficient. Several audio-based spoofing detection methods have been proposed recently but their evaluation is limited to less realistic databases containing homogeneous data. In this paper, we consider eight existing presentation attack detection (PAD) methods and evaluate their performance using two major publicly available speaker databases with spoofing attacks: AVspoof and ASVspoof. We first show that realistic presentation attacks (speech is replayed to PAD system) are significantly more challenging for the considered PAD methods compared to the so called `logical access' attacks (speech is presented to PAD system directly). Then, via a cross-database evaluation, we demonstrate that the existing methods generalize poorly when different databases or different types of attacks are used for training and testing. The results question the efficiency and practicality of the existing PAD systems, as well as, call for creation of databases with larger variety of realistic speech presentation attacks.
https://pypi.python.org/pypi/bob.paper.interspeech_2016
URL