%Aigaion2 BibTeX export from Idiap Publications %Saturday 21 December 2024 07:10:06 PM @INCOLLECTION{Korshunov_SPRINGER_2018, author = {Korshunov, Pavel and Marcel, S{\'{e}}bastien}, editor = {Marcel, S{\'{e}}bastien and Nixon, Mark and Fierrez, Julian and Evans, Nicholas}, projects = {Idiap, SWAN, Tesla}, month = nov, title = {A Cross-database Study of Voice Presentation Attack Detection}, booktitle = {Handbook of Biometric Anti-Spoofing: Presentation Attack Detection, 2nd Edition}, chapter = {19}, year = {2018}, publisher = {Springer}, abstract = {Despite an increasing interest in speaker recognition technologies, a significant obstacle still hinders their wide deployment --- their high vulnerability to spoofing or presentation attacks. These attacks can be easy to perform. For instance, if an attacker has access to a speech sample from a target user, he/she can replay it using a loudspeaker or a smartphone to the recognition system during the authentication process. The ease of executing presentation attacks and the fact that no technical knowledge of the biometric system is required makes these attacks especially threatening in practical application. Therefore, late research focuses on collecting data databases with such attacks and on development of presentation attack detection (PAD) systems. In this chapter, we present an overview of the latest databases and the techniques to detect presentation attacks. We consider several prominent databases that contain bona fide and attack data, including: ASVspoof 2015, ASVspoof 2017, AVspoof, voicePA, and BioCPqD-PA (the only proprietary database). Using these databases, we focus on the performance of PAD systems in the cross-database scenario or in the presence of 'unknown' (not available during training) attacks, as these scenarios are closer to practice, when pre-trained systems need to detect attacks in unforeseen conditions. We first present and discuss the performance of PAD systems based on handcrafted features and traditional Gaussian mixture model (GMM) classifiers. We then demonstrate whether the score fusion techniques can improve the performance of PADs. We also present some of the latest results of using neural networks for presentation attack detection. The experiments show that PAD systems struggle to generalize across databases and mostly unable to detect unknown attacks, with systems based on neural networks demonstrating better performance compared to the systems based on handcraft features.} }