%Aigaion2 BibTeX export from Idiap Publications
%Friday 13 December 2024 04:00:51 PM

@INCOLLECTION{Korshunov_IET_2017,
         author = {Korshunov, Pavel and Marcel, S{\'{e}}bastien},
         editor = {Vielhauer, Claus},
       projects = {Idiap, SWAN, Tesla},
          title = {Presentation attack detection in voice biometrics},
      booktitle = {User-Centric Privacy and Security in Biometrics},
        chapter = {7},
           year = {2017},
      publisher = {The Institution of Engineering and Technology},
        address = {Savoy Place, London WC2R 0BL, UK},
       abstract = {Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-based applications, and speaker recognition in phone banking and other phone-based services. The popularization of the biometric systems, however, exposed their major flaw --- high vulnerability to spoofing attacks. A fingerprint sensor can be easily tricked with a simple glue-made mold, a face recognition system can be accessed using a printed photo, and a speaker recognition system can be spoofed with a replay of pre-recorded voice. The ease with which a biometric system can be spoofed demonstrates the importance of developing efficient anti-spoofing systems that can detect both known (conceivable now) and unknown (possible in the future) spoofing attacks. 

Therefore, it is important to develop mechanisms that can detect such attacks, and it is equally important for these mechanisms to be seamlessly integrated into existing biometric systems for practical and attack-resistant solutions. To be practical, however, an attack detection should have (i) high accuracy, (ii) be well-generalized for different attacks, and (iii) be simple and efficient. 

One reason for the increasing demand for effective presentation attack detection (PAD) systems is the ease of access to people's biometric data. So often, a potential attacker can almost effortlessly obtain necessary biometric samples from social networks, including facial images, audio and video recordings, and even extract fingerprints from high resolution images. Therefore, various privacy protection solutions, such as legal privacy requirements and algorithms for obfuscating personal information, e.g., visual privacy filters, as well as, social awareness of threats to privacy can also increase security of personal information and potentially reduce the vulnerability of biometric systems. 

In this chapter, however, we focus on presentation attacks detection in voice biometrics, i.e., automatic speaker verification (ASV) systems. We discuss vulnerabilities of these systems to presentation attacks (PAs), present different state of the art PAD systems, give the insights into their performances, and discuss the integration of PAD and ASV systems.},
            pdf = {https://publications.idiap.ch/attachments/papers/2017/Korshunov_IET_2017.pdf}
}